• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

You are here: Home / General Cyber Security News / WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
December 19, 2025

WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks.

Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described as a case of out-of-bounds write affecting the iked process that could allow a remote unauthenticated attacker to execute arbitrary code.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“This vulnerability affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer,” the company said in a Thursday advisory.

“If the Firebox was previously configured with the mobile user VPN with IKEv2 or a branch office VPN using IKEv2 to a dynamic gateway peer, and both of those configurations have since been deleted, that Firebox may still be vulnerable if a branch office VPN to a static gateway peer is still configured.”

Cybersecurity

The vulnerability impacts the following versions of Fireware OS –

  • 2025.1 – Fixed in 2025.1.4
  • 12.x – Fixed in 12.11.6
  • 12.5.x (T15 & T35 models) – Fixed in 12.5.15
  • 12.3.1 (FIPS-certified release) – Fixed in 12.3.1_Update4 (B728352)
  • 11.x (11.10.2 up to and including 11.12.4_Update1) – End-of-Life

WatchGuard acknowledged that it has observed threat actors actively attempting to exploit this vulnerability in the wild, with the attacks originating from the following IP addresses –

  • 45.95.19[.]50
  • 51.15.17[.]89
  • 172.93.107[.]67
  • 199.247.7[.]82

Interestingly, the IP address “199.247.7[.]82” was also flagged by Arctic Wolf earlier this week as linked to the exploitation of two recently disclosed security vulnerabilities in Fortinet FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8).

​​

The Seattle-based company has also shared multiple indicators of compromise (IoCs) that device owners can use to determine if their own instances have been infected –

  • A log message stating “Received peer certificate chain is longer than 8. Reject this certificate chain” when the Firebox receives an IKE2 Auth payload with more than 8 certificates
  • An IKE_AUTH request log message with an abnormally large CERT payload size (greater than 2000 bytes)
  • During a successful exploit, the iked process will hang, interrupting VPN connections
  • After a failed or successful exploit, the IKED process will crash and generate a fault report on the Firebox

Cybersecurity

The disclosure comes a little over a month after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added another critical WatchGuard Fireware OS flaw (CVE-2025-9242, CVSS score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog after reports of active exploitation.

It’s currently not known if these two sets of attacks are related. Users are advised to apply the updates as soon as possible to secure against the threat.

As temporary mitigation for devices with vulnerable Branch Office VPN (BOVPN) configurations, the company has urged administrators to disable dynamic peer BOVPNs, create an alias that includes the static IP addresses of remote BOVPN peers, add new firewall policies that allow access from the alias, and disable the default built-in policies that handle VPN traffic.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «nigeria arrests raccoono365 phishing developer linked to microsoft 365 attacks Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
  • Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
  • ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories
  • The Case for Dynamic AI-SaaS Security as Copilots Scale
  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
  • CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation
  • Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Copyright © TheCyberSecurity.News, All Rights Reserved.