CVE-2025-14733

9.8 CRITICAL CISA KEV

📋 TL;DR

A critical out-of-bounds write vulnerability in WatchGuard Fireware OS allows remote unauthenticated attackers to execute arbitrary code on affected systems. This affects Mobile User VPN and Branch Office VPN configurations using IKEv2 with dynamic gateway peers. Organizations running vulnerable Fireware OS versions are at immediate risk.

💻 Affected Systems

Products:
  • WatchGuard Fireware OS
Versions: Fireware OS 11.10.2 to 11.12.4_Update1, 12.0 to 12.11.5, and 2025.1 to 2025.1.3
Operating Systems: Fireware OS
Default Config Vulnerable: ✅ No
Notes: Only affects Mobile User VPN with IKEv2 and Branch Office VPN using IKEv2 when configured with dynamic gateway peers. Static gateway configurations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the firewall, enabling lateral movement into internal networks, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to firewall compromise, network traffic interception, VPN credential theft, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if proper network segmentation, intrusion prevention systems, and strict access controls are in place to contain the breach.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects VPN services typically exposed to the internet.
🏢 Internal Only: MEDIUM - While primarily internet-facing, compromised VPN gateways could be used as pivot points for internal attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The CVSS 9.8 score indicates trivial exploitation with high impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fireware OS 11.12.5, 12.11.6, and 2025.1.4

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027

Restart Required: Yes

Instructions:

1. Download the appropriate patched version from WatchGuard support portal. 2. Backup current configuration. 3. Apply the update through the Web UI or CLI. 4. Reboot the firewall to complete installation. 5. Verify the new version is running.

🔧 Temporary Workarounds

Disable IKEv2 dynamic gateway VPNs

all

Temporarily disable Mobile User VPN and Branch Office VPN configurations using IKEv2 with dynamic gateway peers until patching can be completed.

Switch to static gateway configuration

all

Convert dynamic gateway IKEv2 VPN configurations to static gateway configurations which are not vulnerable.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable VPN gateways from critical internal resources
  • Deploy intrusion prevention systems with signatures for this CVE and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version via Web UI (System > About) or CLI (show version). Verify if Mobile User VPN or Branch Office VPN with IKEv2 dynamic gateway is configured.

Check Version:

show version

Verify Fix Applied:

Confirm Fireware OS version is 11.12.5, 12.11.6, or 2025.1.4 or later. Verify VPN services are functioning correctly post-patch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IKEv2 negotiation failures
  • Multiple authentication attempts from single source
  • Unexpected process creation or system modifications

Network Indicators:

  • Anomalous IKEv2 traffic patterns
  • Unexpected outbound connections from VPN gateways
  • Traffic to known malicious IPs from firewall

SIEM Query:

source="firewall_logs" AND (event_type="ikev2" OR protocol="ikev2") AND (status="failed" OR status="anomalous")

🔗 References

📤 Share & Export