Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability
Identity

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

userBy userDecember 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 19, 2025Ravi LakshmananVulnerability/Network Security

WatchGuard has released a fix that addresses a critical security flaw in Fireware OS that was allegedly exploited in a real-world attack.

The vulnerability is tracked as CVE-2025-14733 (CVSS score: 9.3) and is described as a case of an out-of-bounds write impacting the iked process, potentially allowing a remote unauthenticated attacker to execute arbitrary code.

“This vulnerability affects both mobile user VPNs that use IKEv2 and branch office VPNs that use IKEv2 that are configured with dynamic gateway peers,” the company said in Thursday’s advisory.

“If a Firebox was previously configured with Mobile User VPN with IKEv2 or Branch Office VPN with IKEv2 to dynamic gateway peers, and those configurations are both subsequently removed, the Firebox may still be vulnerable if it is still configured with Branch Office VPN to static gateway peers.”

cyber security

This vulnerability affects the following versions of Fireware OS:

2025.1 – 2025.1.4 Fixed in 12.x – 12.11.6 Fixed in 12.5.x (T15 and T35 models) – 12.5.15 Fixed in 12.3.1 (FIPS certified release) – 12.3.1_Update4 (B728352) 11.x (11.10.2 Fixed below) 11.12.4_Update1) – End of support

WatchGuard acknowledged that it has observed attackers actively attempting to exploit this vulnerability by launching attacks from the following IP addresses:

What is interesting is the IP address “199.247.7”[.]82″ was reported by Arctic Wolf earlier this week as related to the exploitation of two recently disclosed security vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS score: 9.8) in Fortinet FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

​​

The Seattle-based company also shares multiple indicators of compromise (IoCs) that device owners can use to determine whether their instances are infected.

When the Firebox receives an IKE2 Auth payload that contains more than 8 certificates, you see the following log message: “Received peer certificate chain exceeds 8. Please reject this certificate chain.” IKE_AUTH request with unusually large CERT payload size (greater than 2000 bytes) Log message A successful exploit hangs the iked process and disrupts the VPN connection If the exploit fails or succeeds, the IKED process crashes and a failure report is generated on the Firebox.

cyber security

This disclosure comes a little more than a month after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added another critical flaw in WatchGuard Fireware OS (CVE-2025-9242, CVSS score: 9.3) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation.

It is currently unknown whether these two attack sets are related. Users are advised to apply updates as soon as possible to protect themselves from threats.

As a temporary mitigation for devices with vulnerable Branch Office VPN (BOVPN) configurations, the company recommends that administrators disable dynamic peer BOVPN, create an alias with the static IP address of the remote BOVPN peer, add a new firewall policy that allows access from the alias, and disable the default built-in policy that handles VPN traffic.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK nuclear organizations unite to accelerate nuclear decommissioning
Next Article Japan trials 100-kilowatt laser weapon – capable of cutting metal and drones while in flight
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

Nigeria arrests RaccoonO365 phishing developer involved in Microsoft 365 attack

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.