Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical WatchGuard Firebox Vulnerability Exploited in Attacks

Tracked as CVE-2025-9242 (CVSS score of 9.3), the flaw leads to unauthenticated, remote code execution on vulnerable firewalls.

CISA KEV

A recent critical-severity vulnerability in WatchGuard Firebox firewalls has been exploited in the wild, the US cybersecurity agency CISA warns.

Powered by WatchGuard’s Fireware OS, the Firebox network security devices control all traffic to and from the internal network, and are designed to protect the environment from external threats.

In September, WatchGuard warned that a critical-severity out-of-bounds write bug in the Fireware OS iked process could be exploited for unauthenticated remote code execution.

Tracked as CVE-2025-9242 (CVSS score of 9.3), the security defect affects “both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer,” WatchGuard said.

In late October, just as WatchTowr published a technical writeup on the vulnerability, The Shadowserver Foundation warned that its scanners were seeing over 73,000 Firebox network appliances that had not been patched against the bug.

Now, CISA has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) list, urging federal agencies to patch it within three weeks, as mandated by Binding Operational Directive (BOD) 22-01.

Advertisement. Scroll to continue reading.

WatchGuard resolved the issue in Fireware OS versions 2025.1.1, 12.11.4, 12.5.13, and 12.3.1_Update3 (B722811), noting that no fixes would be released for Fireware OS 11.x, which has been discontinued.

On October 21, the vendor updated its advisory to mention the flaw’s in-the-wild exploitation and to include indicators of compromise (IOCs).

“As of this update, in addition to installing the latest Fireware OS release that contains the fix, administrators should take precautions to rotate all locally stored secrets on vulnerable Firebox appliances,” the company said.

CISA added the security defect to the KEV list alongside CVE-2025-12480, a critical vulnerability in Gladinet’s Triofox secure file sharing and remote access solution, and CVE-2025-62215, a privilege escalation bug in the Windows kernel.

Gladinet patched the Triofox flaw in late July and its exploitation started a month later. The Windows kernel defect has been exploited as a zero-day.

Related: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Related: Runc Vulnerabilities Can Be Exploited to Escape Containers

Related: CISA Warns of CWP Vulnerability Exploited in the Wild

Related: CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.