
[CIVN-2025-0381] Remote Code Execution Vulnerability in WatchGuard Fireware
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in WatchGuard Fireware
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Fireware OS 2025.1 versions prior to 2025.1.4
Fireware OS 12.0 versions prior to 12.11.6
Fireware OS 11.x versions from 11.10.2 through 11.12.4_Update1
Overview
A vulnerability has been reported in WatchGuards Firebox Fireware OS which could allow a remote attacker to execute arbitrary code on the target system.
Target Audience:
Network administrators, security administrators, SOC teams, and end-user organizations using WatchGuard Firebox Fireware OS.
Risk Assessment:
High risk to confidentiality, integrity, and availability.
Impact Assessment:
Potential for remote code execution and complete system compromise.
Description
WatchGuard Fireware is the operating system that runs on WatchGuard Firebox appliances, providing firewall, VPN, and unified threat management security features.
This vulnerability exists in WatchGuard¿s Firebox Fireware OS due to an out-of-bounds write flaw in the IKEv2 (iked) process. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted IKEv2 traffic to the affected device.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the target system leading to complete system compromise.
Note: This vulnerability is being exploited in the wild. Users are advised to urgently patch their systems.
Solution
Upgrade to the latest versions as mentioned in the advisory:
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027
Vendor Information
Watchguard
https://www.watchguard.com/
References
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027
CVE Name
CVE-2025-14733
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=dGX9
—–END PGP SIGNATURE—–


