CVE-2025-1545

7.5 HIGH

📋 TL;DR

An XPath injection vulnerability in WatchGuard Fireware OS allows remote unauthenticated attackers to extract sensitive configuration data from Firebox devices. This affects systems with authentication hotspots configured. The vulnerability impacts multiple Fireware OS versions from 11.11 through 2025.1.2.

💻 Affected Systems

Products:
  • WatchGuard Firebox
Versions: Fireware OS 11.11 to 11.12.4+541730, 12.0 to 12.11.4, 12.5 to 12.5.13, 2025.1 to 2025.1.2
Operating Systems: Fireware OS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with at least one authentication hotspot configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Firebox configuration including credentials, network topology, firewall rules, and VPN configurations leading to network breach.

🟠

Likely Case

Extraction of sensitive configuration data such as user credentials, network settings, and security policies.

🟢

If Mitigated

Limited information disclosure if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation via exposed web interfaces.
🏢 Internal Only: MEDIUM - Requires network access but no authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XPath injection typically has low exploitation complexity once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00025

Restart Required: Yes

Instructions:

1. Access WatchGuard System Manager 2. Connect to affected Firebox 3. Check for available updates 4. Apply Fireware OS update 5. Reboot device

🔧 Temporary Workarounds

Disable Authentication Hotspots

all

Remove or disable all authentication hotspots to eliminate the attack vector

Restrict Web Interface Access

all

Limit access to management interfaces using firewall rules and network segmentation

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Firebox management interfaces
  • Deploy web application firewall (WAF) with XPath injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version and verify if authentication hotspots are configured

Check Version:

show version (via CLI) or check in Web UI

Verify Fix Applied:

Verify Fireware OS version is updated beyond affected ranges and test web interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual XPath queries in web server logs
  • Multiple failed authentication attempts
  • Unexpected configuration access patterns

Network Indicators:

  • Unusual HTTP POST requests to authentication endpoints
  • Suspicious parameter values in web requests

SIEM Query:

source="firebox-logs" AND (http_method="POST" AND uri CONTAINS "/auth/") AND (param_values CONTAINS "' OR '" OR param_values CONTAINS "' AND '")

🔗 References

📤 Share & Export