CVE-2025-1547

7.2 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in WatchGuard Fireware OS allows authenticated privileged users to execute arbitrary code via specially crafted CLI commands. This affects Fireware OS versions 12.0 through 12.5.12+701324 and 12.6 through 12.11.2. Attackers with administrative access could gain complete control of affected firewall devices.

💻 Affected Systems

Products:
  • WatchGuard Fireware OS
Versions: 12.0 through 12.5.12+701324, 12.6 through 12.11.2
Operating Systems: Fireware OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged CLI access. Affects all devices running vulnerable Fireware OS versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of firewall device leading to network pivoting, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation from authenticated user to full system control, enabling configuration changes and credential harvesting.

🟢

If Mitigated

Limited impact if proper access controls restrict CLI access to trusted administrators only.

🌐 Internet-Facing: LOW (requires authenticated privileged access, not directly internet exploitable)
🏢 Internal Only: HIGH (insider threat or compromised admin credentials could lead to full device compromise)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated privileged access and knowledge of CLI command structure. No public exploit available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fireware OS 12.5.13+701324 and 12.11.3

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00013

Restart Required: Yes

Instructions:

1. Download latest firmware from WatchGuard support portal. 2. Backup current configuration. 3. Apply firmware update via Web UI or CLI. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only essential trusted administrators using role-based access controls.

Monitor CLI Activity

all

Enable detailed logging of all CLI commands and monitor for suspicious certificate-related operations.

🧯 If You Can't Patch

  • Implement strict access controls limiting CLI access to minimum necessary personnel
  • Enable comprehensive logging and monitoring of all CLI sessions and certificate operations

🔍 How to Verify

Check if Vulnerable:

Check Fireware OS version via Web UI (System > About) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify version is 12.5.13+701324 or higher for 12.5.x branch, or 12.11.3 or higher for 12.6+ branch

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI certificate request commands
  • Multiple failed certificate operations
  • Privilege escalation attempts via CLI

Network Indicators:

  • Unexpected configuration changes
  • Unusual outbound connections from firewall

SIEM Query:

source="firewall" AND (event="cli_command" AND command="*certificate*request*")

🔗 References

📤 Share & Export