CVE-2022-25361
📋 TL;DR
CVE-2022-25361 allows unauthenticated remote attackers to delete arbitrary files from specific directories on WatchGuard Firebox and XTM appliances. This affects Fireware OS versions before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2. Organizations using these vulnerable firewall appliances are at risk.
💻 Affected Systems
- WatchGuard Firebox
- WatchGuard XTM
📦 What is this software?
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
Fireware by Watchguard
⚠️ Risk & Real-World Impact
Worst Case
Critical system files could be deleted, causing device malfunction, service disruption, or complete system failure, potentially leading to network downtime.
Likely Case
Attackers delete configuration or log files to disrupt operations, hide evidence of other attacks, or cause service interruptions.
If Mitigated
With proper network segmentation and access controls, impact is limited to specific directories, preventing system-wide compromise.
🎯 Exploit Status
Exploitation requires no authentication and appears straightforward based on vulnerability description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fireware OS 12.7.2_U2, 12.1.3_U8, or 12.5.9_U2 and later
Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00004
Restart Required: Yes
Instructions:
1. Log into WatchGuard System Manager 2. Check current Fireware OS version 3. Download appropriate patch from WatchGuard support portal 4. Apply update through System Manager 5. Reboot appliance after update completes
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to management interfaces using firewall rules or network segmentation
🧯 If You Can't Patch
- Implement strict network segmentation to isolate WatchGuard appliances from untrusted networks
- Monitor for suspicious file deletion attempts in system logs and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check Fireware OS version in WatchGuard System Manager or via SSH: show version
Check Version:
show version
Verify Fix Applied:
Verify version is 12.7.2_U2, 12.1.3_U8, 12.5.9_U2 or later, and test file deletion attempts fail
📡 Detection & Monitoring
Log Indicators:
- Unexpected file deletion events in system logs
- Failed authentication attempts followed by file operations
Network Indicators:
- Unusual traffic patterns to management interfaces
- HTTP requests attempting file deletion operations
SIEM Query:
source="watchguard" AND (event_type="file_delete" OR action="delete") AND src_ip NOT IN [trusted_ips]