CVE-2025-12026

7.2 HIGH

📋 TL;DR

An authenticated privileged user can execute arbitrary code on WatchGuard Fireware OS devices by exploiting an out-of-bounds write vulnerability in the certificate request command. This affects Fireware OS versions 12.0-12.11.4, 12.5-12.5.13, and 2025.1-2025.1.2. Attackers with administrative access can gain full system control.

💻 Affected Systems

Products:
  • WatchGuard Fireware OS
Versions: 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, 2025.1 up to and including 2025.1.2
Operating Systems: Fireware OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged user access to CLI. All affected versions are vulnerable by default when running these versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, pivot to internal networks, exfiltrate sensitive data, or disable firewall protections entirely.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, or lateral movement within the network.

🟢

If Mitigated

Limited to authenticated administrative users only, with proper access controls preventing unauthorized administrative access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated privileged CLI access. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fireware OS 12.11.5, 12.5.14, 2025.1.3 or later

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00017

Restart Required: Yes

Instructions:

1. Download latest firmware from WatchGuard support portal. 2. Backup current configuration. 3. Apply firmware update via Web UI or CLI. 4. Reboot device. 5. Verify version is patched.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit administrative CLI access to only trusted users and implement strict access controls.

Network Segmentation

all

Isolate management interfaces from general network access.

🧯 If You Can't Patch

  • Implement strict access controls for administrative accounts and monitor for suspicious CLI activity.
  • Segment management interfaces and implement network-based intrusion detection for management traffic.

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version via Web UI (System > About) or CLI (show version). Compare against affected versions.

Check Version:

show version

Verify Fix Applied:

Verify version is 12.11.5, 12.5.14, 2025.1.3 or later after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI certificate request commands
  • Multiple failed authentication attempts followed by successful admin login
  • Unexpected system reboots or configuration changes

Network Indicators:

  • Unusual management interface traffic patterns
  • CLI sessions from unexpected source IPs

SIEM Query:

source="fireware" AND (event_type="cli_command" AND command="certificate-request") OR (auth_failure AND auth_success AND user_role="admin")

🔗 References

📤 Share & Export