125,000 IPs WatchGuard Firebox Devices Exposed to Internet Vulnerable to RCE Attacks

125,000 IPs WatchGuard Firebox Devices Exposed to Internet Vulnerable to RCE Attacks

The Shadowserver Foundation identified approximately 125,000 WatchGuard Firebox firewall devices worldwide at risk due to a critical vulnerability actively exploited.

The flaw, tracked as CVE-2025-14733, enables unauthenticated remote attackers to execute arbitrary code on unpatched devices with minimal effort.​

The vulnerability stems from an out-of-bounds write flaw in the WatchGuard Fireware OS IKEv2 VPN key exchange process.

With a CVSS score of 9.8, this critical flaw requires no user interaction. It can be exploited over the network without authentication.

CVE ID Vulnerability Type CVSS Score Affected Component Attack Vector
CVE-2025-14733 Out-of-Bounds Write 9.8 WatchGuard Fireware OS iked process Network (Unauthenticated)

Massive Exposure Discovered

WatchGuard confirmed that threat actors are actively attempting exploitation in the wild, making this a genuine zero-day threat for organizations that have not yet patched.​

The Shadowserver Foundation reported this in a post on X
The Shadowserver Foundation reported this in a post on X.

The vulnerability affects explicitly mobile user VPN configurations with IKEv2 and branch office VPN setups using IKEv2 with dynamic gateway peers.

google

Hazardous is a “zombie configuration” scenario: even if administrators deleted vulnerable VPN settings. Firewalls may remain compromised if branch-office VPN tunnels to static-gateway peers remain in place.​

The vulnerability impacts multiple Fireware OS versions.

Fireware Version Status Required Action
2025.1 (≤ 2025.1.3) Vulnerable Upgrade to 2025.1.4
12.x (≤ 12.11.5) Vulnerable Upgrade to 12.11.6
12.5.x Vulnerable Upgrade to 12.5.15
12.3.1 (FIPS) Vulnerable Update to 12.3.1 Update 4
11.x End of Life Full upgrade required

The scale of exposure is alarming. Shadowserver’s scan identified vulnerable devices worldwide, with concentrations in North America and Europe.

This mirrors a previous incident in which Shadowserver identified more than 75,000 unpatched Firebox devices vulnerable to CVE-2025-9242.​

WatchGuard provided specific indicators of compromise, including four IP addresses directly linked to active exploitation attempts.

Organizations should review firewall logs for certificate chain anomalies and abnormally large IKE_AUTH payloads exceeding 2,000 bytes.​

Organizations must prioritize updating all Firebox devices immediately. Security teams should monitor for suspicious VPN activities and review audit logs for indicators of attack.

Rotate all locally stored credentials on potentially compromised appliances. Given active exploitation, delays substantially increase breach risk.​

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link