Article Details
Scrape Timestamp (UTC): 2025-09-18 08:25:44.469
Original Article Text
Click to Toggle View
WatchGuard warns of critical vulnerability in Firebox firewalls. WatchGuard has released security updates to address a remote code execution vulnerability impacting the company's Firebox firewalls. Tracked as CVE-2025-9242, this critical security flaw is caused by an out-of-bounds write weakness that can allow attackers to execute malicious code remotely on vulnerable devices following successful exploitation. CVE-2025-9242 affects firewalls running Fireware OS 11.x (end of life), 12.x, and 2025.1, and was fixed in versions 12.3.1_Update3 (B722811), 12.5.13, 12.11.4, and 2025.1.1. While Firebox firewalls are only vulnerable to attacks if they are configured to use IKEv2 VPN, WatchGuard added that they may still be at risk of compromise, even if the vulnerable configurations have been deleted, if a branch office VPN to a static gateway peer is still configured. "An Out-of-bounds Write vulnerability in the WatchGuard Fireware OS iked process may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer," the company warned in a Wednesday advisory. "If the Firebox was previously configured with the mobile user VPN with IKEv2 or a branch office VPN using IKEv2 to a dynamic gateway peer, and both of those configurations have since been deleted, that Firebox may still be vulnerable if a branch office VPN to a static gateway peer is still configured." WatchGuard also provides a temporary workaround for administrators who can't immediately patch devices running vulnerable software configured with Branch Office VPN (BOVPN) tunnels to static gateway peers. This requires them to disable dynamic peer BOVPNs, add new firewall policies, and disable the default system policies that handle VPN traffic, as outlined in this support document, which provides detailed instructions on how to secure access to BOVPNs that use IPSec and IKEv2. While this critical vulnerability is not yet being exploited in the wild, admins are still advised to patch their WatchGuard Firebox devices, as threat actors consider firewalls an attractive target. For instance, the Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity vulnerability, to compromise SonicWall firewalls. Two years ago, in April 2022, the Cybersecurity and Infrastructure Security Agency (CISA) also ordered federal civilian agencies to patch an actively exploited bug impacting WatchGuard Firebox and XTM firewall appliances. WatchGuard collaborates with over 17,000 security resellers and service providers to protect the networks of more than 250,000 small and mid-sized companies worldwide, Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
WatchGuard identified a critical remote code execution flaw, CVE-2025-9242, in its Firebox firewalls, posing a significant risk to affected systems.
The vulnerability stems from an out-of-bounds write issue, allowing attackers to execute arbitrary code on compromised devices.
Affected systems include Fireware OS versions 11.x, 12.x, and 2025.1, with fixes available in newer updates such as 12.3.1_Update3 and 12.11.4.
Firebox devices using IKEv2 VPN configurations are particularly vulnerable, even if previous configurations have been deleted but static gateway peers remain.
WatchGuard advises immediate patching and provides a workaround for administrators unable to update, involving firewall policy adjustments and disabling dynamic peer BOVPNs.
Although no exploitation has been reported, threat actors are known to target firewalls, emphasizing the urgency for administrators to secure their systems.
WatchGuard's network protection spans over 250,000 small and mid-sized businesses globally, underscoring the potential impact of this vulnerability.