WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

An urgent security update has been released to fix a critical zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw in the wild to take control of affected devices.

The vulnerability, tracked as CVE-2025-14733, carries a critical severity score of 9.3 out of 10. It allows a remote attacker to execute malicious code on the firewall without needing a username or password.

The issue is described as an “Out-of-bounds Write” vulnerability located in the ike process, which handles VPN connections on the device.

Specifically, the flaw affects the Mobile User VPN and Branch Office VPN (when using IKEv2). It occurs when the system tries to process a connection request.

If an attacker sends a specially crafted request, they can corrupt the system’s memory and hijack the firewall.

WatchGuard noted that even after deleting a vulnerable VPN configuration, your device may remain at risk if a Branch Office VPN with a static gateway remains active.

Active 0-Day Exploitation Detected

WatchGuard confirmed they have “observed threat actors actively attempting to exploit this vulnerability.” To help administrators defend their networks, they released specific indicators of compromise (IoCs).

Suspicious IP Addresses:

Suspicious IP Address Indicator
45.95.19[.]50 Strong sign of attack-related traffic
51.15.17[.]89 Strong sign of attack-related traffic
172.93.107[.]67 Strong sign of attack-related traffic
199.247.7[.]82 Strong sign of attack-related traffic

Administrators should check their logs for:

Indicator Description
Large Certificate Payloads Logs show an IKE_AUTH request with a CERT size greater than 2000 bytes
Long Certificate Chains Errors report: “Received peer certificate chain is longer than 8”
Process Crashes The iked process suddenly hangs or crashes, which may signal an exploit attempt

WatchGuard has released software updates to fix the issue. Admins should upgrade to the following versions immediately:

Current Fireware OS Version Recommended Upgrade Version
Fireware OS 2025.1 Upgrade to 2025.1.4
Fireware OS 12.x Upgrade to 12.11.6
Fireware OS 12.5.x (T15/T35) Upgrade to 12.5.15

If you find evidence that your device was targeted, simply installing the patch is not enough. WatchGuard recommends rotating all shared secrets (passwords and keys) stored on the device, as attackers may have stolen them.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Checklist => Start for Free

The post WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls appeared first on Cyber Security News.