CVE-2022-25360

8.8 HIGH

📋 TL;DR

CVE-2022-25360 allows authenticated remote attackers with unprivileged credentials to upload files to arbitrary locations on WatchGuard Firebox and XTM appliances. This vulnerability affects Fireware OS versions before specific security updates, potentially leading to system compromise.

💻 Affected Systems

Products:
  • WatchGuard Firebox appliances
  • WatchGuard XTM appliances
Versions: Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2
Operating Systems: Fireware OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with unprivileged credentials. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover via arbitrary file upload leading to remote code execution, configuration modification, or installation of persistent backdoors.

🟠

Likely Case

Unauthorized file uploads that could modify system files, disrupt services, or enable further privilege escalation.

🟢

If Mitigated

Limited impact if proper access controls and file integrity monitoring are in place, though the vulnerability still presents a security risk.

🌐 Internet-Facing: HIGH - Firewalls are typically internet-facing, and authenticated attackers could exploit this remotely.
🏢 Internal Only: MEDIUM - Internal attackers with credentials could exploit, but requires authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but the vulnerability itself is straightforward.

Exploitation requires valid credentials but minimal technical skill once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fireware OS 12.7.2_U2, 12.1.3_U8, or 12.5.9_U2 and later

Vendor Advisory: https://www.watchguard.com/support/release-notes/fireware/12/en-US/EN_ReleaseNotes_Fireware_12_7_2/index.html#Fireware/en-US/resolved_issues.html

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from WatchGuard support portal. 2. Backup current configuration. 3. Apply firmware update through web interface or CLI. 4. Reboot appliance. 5. Verify update was successful.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative access to trusted IP addresses and users only.

Implement strong credential policies

all

Enforce strong passwords, multi-factor authentication, and regular credential rotation.

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected appliances from critical systems.
  • Deploy file integrity monitoring to detect unauthorized file uploads or modifications.

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version via web interface (System > About) or CLI (show version). Compare against affected versions.

Check Version:

show version (CLI) or check System > About in web interface

Verify Fix Applied:

Verify version is 12.7.2_U2, 12.1.3_U8, 12.5.9_U2 or later. Test file upload functionality with unprivileged credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file upload events
  • Authentication from unusual sources followed by file operations
  • File modification in system directories

Network Indicators:

  • Unusual outbound connections from firewall appliance
  • File transfer patterns to/from appliance

SIEM Query:

source="firewall_logs" AND (event_type="file_upload" OR event_type="file_modify") AND user_privilege="low"

🔗 References

📤 Share & Export