Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

Senate Republicans deepfaked Chuck Schumer, but X isn’t taking it down

AI tools run on fracked gas and bulldozed land in Texas

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers discover bug in WatchGuard VPN that could allow attackers to take over your device
Identity

Researchers discover bug in WatchGuard VPN that could allow attackers to take over your device

userBy userOctober 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 17, 2025Ravi LakshmananVulnerabilities / VPN Security

Cybersecurity researchers have detailed a critical security flaw recently patched in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code.

This vulnerability is tracked as CVE-2025-9242 (CVSS score: 9.3) and is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 and later 11.12.4_Update1, 12.0 and later 12.11.3, and 2025.1.

“An out-of-bounds write vulnerability in the iked process in WatchGuard Fireware OS could allow a remote, unauthenticated attacker to execute arbitrary code,” WatchGuard said in an advisory released last month. “This vulnerability affects both mobile user VPNs using IKEv2 and branch office VPNs using IKEv2 when configured with dynamic gateway peers.”

This issue has been resolved in the following versions:

2025.1 – Fixed in 2025.1.1 12.x – Fixed in 12.11.4 12.3.1 (FIPS certified release) – Fixed in 12.3.1_Update3 (B722811) 12.5.x (T15 and T35 models) – Fixed in 12.5.13) 11.x – End of support reached

DFIR retainer service

A new analysis from watchTowr Labs describes CVE-2025-9242 as having “all the hallmarks that friendly neighborhood ransomware gangs love to see,” including the fact that it affects internet-facing services, can be exploited without authentication, and can execute arbitrary code on perimeter appliances.

According to security researcher McCaulay Hudson, the vulnerability is rooted in a function “ike2_ProcessPayload_CERT” located in the file “src/ike/iked/v2/ike2_payload_cert.c”, which is designed to copy the client’s “identity” into a 520-byte local stack buffer and validate the provided client SSL certificate.

The issue is caused by a missing identity buffer length check, which allows an attacker to cause an overflow and enable remote code execution during the IKE_SA_AUTH phase of the handshake process used to establish a virtual private network (VPN) tunnel between a client and WatchGuard’s VPN service via the IKE key management protocol.

“The server attempts to validate the certificate, but that validation happens after the vulnerable code has executed, allowing the path of the vulnerable code to be reached before authentication,” Hudson said.

WatchTowr noted that while the WatchGuard Fireware OS does not have an interactive shell such as “/bin/bash”, an attacker could weaponize this flaw to gain control of the instruction pointer register (aka RIP or program counter) and ultimately leverage the mprotect() system call to spawn a Python interactive shell over TCP, effectively bypassing the NX bit (aka the no-execute bit). mitigation measures.

Once you have a remote Python shell, you can further expand your foothold through a multi-step process to get a full Linux shell.

Run execve directly within Python to remount the filesystem as read/write Download the BusyBox busybox binaries to the target Symlink /bin/sh to the BusyBox binaries

This development comes amidst watchTowr’s demonstration that a now-fixed denial of service (DoS) vulnerability (CVE-2025-3600, CVSS score: 7.5) affecting the Progress Telerik UI for AJAX could also allow remote code execution, depending on the targeted environment. This vulnerability was resolved by Progress Software on April 30, 2025.

CIS build kit

“Depending on the target codebase, such as the presence of certain no-argument constructors, finalizers, or unsafe assembly resolvers, the impact could extend to remote code execution,” security researcher Piotr Bajdro said.

Earlier this month, Watchtower’s Sina Kheirkhah also disclosed a critical pre-authenticated command injection flaw in Dell UnityVSA (CVE-2025-36604, CVSS score: 9.8/7.3) that could lead to remote command execution. Dell fixed this vulnerability in July 2025 after making a responsible disclosure on March 28th.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWorking with nature for integrated pest management
Next Article Meta previews new parental controls for AI Experiences
user
  • Website

Related Posts

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

October 17, 2025

North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware

October 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

Senate Republicans deepfaked Chuck Schumer, but X isn’t taking it down

AI tools run on fracked gas and bulldozed land in Texas

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.