CVE-2025-12195

7.2 HIGH

📋 TL;DR

An authenticated privileged user can execute arbitrary code on WatchGuard Fireware OS devices by sending specially crafted IPSec configuration commands through the CLI. This out-of-bounds write vulnerability affects Fireware OS versions 11.0-11.12.4, 12.0-12.11.4, 12.5-12.5.13, and 2025.1-2025.1.2.

💻 Affected Systems

Products:
  • WatchGuard Fireware OS
Versions: 11.0 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, 2025.1 up to and including 2025.1.2
Operating Systems: Fireware OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged CLI access; affects all configurations with vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to network infiltration, data exfiltration, or use as pivot point for lateral movement.

🟠

Likely Case

Privileged authenticated attacker gains root access to firewall, enabling traffic interception, rule modification, or persistence.

🟢

If Mitigated

Limited impact due to strict access controls, network segmentation, and monitoring preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated privileged access and knowledge of IPSec configuration commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions per release branch

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00019

Restart Required: Yes

Instructions:

1. Review vendor advisory for fixed versions. 2. Backup configuration. 3. Download appropriate firmware update. 4. Apply update via Web UI or CLI. 5. Reboot device. 6. Verify version and functionality.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only trusted administrators using strict access controls.

Monitor IPSec Configuration Changes

all

Implement logging and alerting for IPSec configuration modifications.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Enforce least privilege access controls and monitor privileged user activities

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version via Web UI (System > About) or CLI (show version). Compare against affected version ranges.

Check Version:

show version

Verify Fix Applied:

Verify version is updated beyond affected ranges and test IPSec functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IPSec configuration changes
  • Multiple failed CLI authentication attempts followed by successful login
  • Unexpected CLI sessions from unusual sources

Network Indicators:

  • Anomalous outbound connections from firewall
  • Unexpected IPSec tunnel establishment

SIEM Query:

source="firewall_logs" AND (event_type="cli_command" AND command="*ipsec*") OR (auth_failure AND subsequent_success)

🔗 References

📤 Share & Export