Vulnerabilities

Severe WatchGuard Firebox Vulnerabilities Enable Attackers To Bypass Integrity Checks and Inject Malicious Code

WatchGuard disclosed multiple high-severity vulnerabilities in Firebox appliances on December 4, 2025, including flaws that let privileged attackers execute arbitrary code and bypass boot-time integrity checks.

These issues affect Fireware OS versions up to 12.11.4 and 2025.1.2, potentially compromising network security gateways used by enterprises.

Attackers with privileged access exploit out-of-bounds write flaws in the management CLI to inject malicious code.

For instance, crafted “ping” commands trigger memory corruption beyond allocated bounds, enabling arbitrary code execution.

Similar vulnerabilities in IPSec configuration and certificate request commands allow overwriting critical memory regions, leading to complete control over the device process.

Combined with CVE-2025-13940, a medium-severity bypass of boot-time system integrity checks, tampered firmware persists without triggering a shutdown. However, on-demand web UI checks detect failures.

Key Vulnerabilities

Advisory IDCVE IDCVSS ScoreImpactDescription [web id]
WGSA-2025-00026CVE-2025-139406.7MediumBoot-time integrity check bypass via expected behavior violation
WGSA-2025-00020CVE-2025-121968.6HighAuthenticated OOB write in CLI ping command for arbitrary code execution
WGSA-2025-00019CVE-2025-121958.6HighAuthenticated OOB write in CLI IPSec configuration for arbitrary code execution
WGSA-2025-00017CVE-2025-120268.6HighAuthenticated OOB write in certd CLI for arbitrary code execution
WGSA-2025-00025CVE-2025-15458.2HighUnauthenticated XPath injection in web CGI exposing config data

These flaws require privileged credentials for most exploits, but initial access via phishing or prior compromises amplifies risk.

The OOB writes stem from insufficient bounds checking in CLI parsers, allowing oversized inputs to corrupt adjacent heap or stack memory.

CVSS vectors highlight network accessibility and the high privileges required, scoring up to 8.7 for availability impacts in the related IKEv2 memory corruption.

Mitigation Steps

Administrators must update to the resolved versions: Fireware 12.11.5, 12.5.14 (T-series), or 2025.1.3 immediately.

Disable CLI access if unused, enforce least privilege, and monitor for anomalous commands.

No workarounds exist; end-of-life 11.x versions remain vulnerable WatchGuard credits Cody Sixteen and btaol for their disclosures.

Organizations using Firebox for VPN or gateway protection face elevated risks from persistent code injection undetected by boot checks.

Prompt patching prevents supply chain-like compromises in firewalls.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago