Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Warns Of WatchGuard Fireware Flaw

November 13, 2025
Reading Time: 3 mins read
in Alerts
Firefox Chrome Fix High Severity Bugs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently placed a high-severity security flaw impacting WatchGuard Fireware into its Known Exploited Vulnerabilities (KEV) catalog, a direct result of evidence confirming its active exploitation by malicious actors. This critical vulnerability is identified as CVE-2025-9242 and carries a significant CVSS score of 9.3. It is described as an out-of-bounds write vulnerability that specifically affects various versions of the Fireware OS, including 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3, and version 2025.1.

CISA formally warned in an advisory that this vulnerability resides within the operating system’s iked process on the WatchGuard Firebox appliance. The nature of the flaw is such that it “may allow a remote unauthenticated attacker to execute arbitrary code,” meaning an attacker could potentially gain control of the device without needing prior credentials. This lack of authentication requirement underscores the seriousness and accessibility of the exploit, making it a highly attractive target for threat actors targeting network infrastructure.

The technical specifics of the defect were initially published by watchTowr Labs last month. Their research indicated that the root cause of the issue is a missing length check on an identification buffer, which is processed during the Internet Key Exchange (IKE) handshake. A security researcher from the company, McCaulay Hudson, elaborated that while the server does attempt certificate validation, the critical piece of vulnerable code executes before this validation step. This timing is essential, as it allows the vulnerable code path to be reached successfully on a pre-authentication basis.

While there is currently a lack of public information detailing the specific methods or the precise scale of ongoing exploitation, the exposed attack surface remains substantial. Data collected by the Shadowserver Foundation indicates that as of November 12, 2025, more than 54,300 Firebox instances globally are still exposed to this critical bug. This number represents a notable decrease from a peak of 75,955 observed on October 19, suggesting some organizations have begun patching. Of the current vulnerable devices, approximately 18,500 are located within the United States, followed by significant concentrations in Italy (5,400), the U.K. (4,000), Germany (3,600), and Canada (3,000).

This addition to the KEV catalog coincides with CISA also adding two other significant security issues. The first is CVE-2025-62215 (CVSS score: 7.0), a recently disclosed flaw affecting the Windows kernel. The second is CVE-2025-12480 (CVSS score: 9.1), an improper access control vulnerability identified in the Gladinet Triofox platform. In this latter case, Mandiant Threat Defense team, a part of Google, has specifically attributed its exploitation to an identified threat actor designated as UNC6485. Due to the high risk associated with all KEV entries, Federal Civilian Executive Branch (FCEB) agencies have been given a mandatory deadline of December 3, 2025, to implement WatchGuard’s available patches.

Reference:

  • CISA Flags Critical WatchGuard Fireware Bug Exposing Thousands To No Login Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial