Thursday, April 16, 2026

Severe WatchGuard Firebox Vulnerabilities Enable Attackers To Bypass Integrity Checks and Inject Malicious Code

WatchGuard disclosed multiple high-severity vulnerabilities in Firebox appliances on December 4, 2025, including flaws that let privileged attackers execute arbitrary code and bypass boot-time integrity checks.

These issues affect Fireware OS versions up to 12.11.4 and 2025.1.2, potentially compromising network security gateways used by enterprises.

Attackers with privileged access exploit out-of-bounds write flaws in the management CLI to inject malicious code.

For instance, crafted “ping” commands trigger memory corruption beyond allocated bounds, enabling arbitrary code execution.

Similar vulnerabilities in IPSec configuration and certificate request commands allow overwriting critical memory regions, leading to complete control over the device process.

Combined with CVE-2025-13940, a medium-severity bypass of boot-time system integrity checks, tampered firmware persists without triggering a shutdown. However, on-demand web UI checks detect failures.

Key Vulnerabilities

Advisory IDCVE IDCVSS ScoreImpactDescription [web id]
WGSA-2025-00026CVE-2025-139406.7MediumBoot-time integrity check bypass via expected behavior violation
WGSA-2025-00020CVE-2025-121968.6HighAuthenticated OOB write in CLI ping command for arbitrary code execution
WGSA-2025-00019CVE-2025-121958.6HighAuthenticated OOB write in CLI IPSec configuration for arbitrary code execution
WGSA-2025-00017CVE-2025-120268.6HighAuthenticated OOB write in certd CLI for arbitrary code execution
WGSA-2025-00025CVE-2025-15458.2HighUnauthenticated XPath injection in web CGI exposing config data

These flaws require privileged credentials for most exploits, but initial access via phishing or prior compromises amplifies risk.

The OOB writes stem from insufficient bounds checking in CLI parsers, allowing oversized inputs to corrupt adjacent heap or stack memory.

CVSS vectors highlight network accessibility and the high privileges required, scoring up to 8.7 for availability impacts in the related IKEv2 memory corruption.

Mitigation Steps

Administrators must update to the resolved versions: Fireware 12.11.5, 12.5.14 (T-series), or 2025.1.3 immediately.

Disable CLI access if unused, enforce least privilege, and monitor for anomalous commands.

No workarounds exist; end-of-life 11.x versions remain vulnerable WatchGuard credits Cody Sixteen and btaol for their disclosures.

Organizations using Firebox for VPN or gateway protection face elevated risks from persistent code injection undetected by boot checks.

Prompt patching prevents supply chain-like compromises in firewalls.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News