Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

Posted on November 11, 2025November 11, 2025 By CWS

A vital vulnerability in WatchGuard Firebox firewalls might permit attackers to achieve full administrative entry to the units with none authentication.

The flaw, tracked as CVE-2025-59396, stems from insecure default configurations that expose SSH entry on port 4118 utilizing hardcoded credentials.

WatchGuard Firebox home equipment by way of September 10, 2025, ship with default SSH credentials (admin:readwrite) that stay accessible on port 4118.

Because of this any attacker with community entry to the system can remotely join and achieve full administrative privileges.

The vulnerability requires no particular exploit instruments; easy SSH purchasers like PuTTY are enough to ascertain a connection.

Based on the advisory launched on GitHub, there’s a harmful misconfiguration that impacts your complete Firebox firewall collection.

AspectDetailsCVE IDCVE-2025-59396VendorWatchGuardProductFirebox SeriesAffected ComponentSSH Service (Port 4118)Assault VectorRemote unauthenticated accessCVSS ImpactsRCE, Privilege Escalation, Info Disclosure

WatchGuard Firebox Firewall Vulnerability

An unauthenticated distant attacker can retrieve delicate community data, together with ARP tables, community configurations, and person account particulars. They will additionally entry function keys and system location information.

Extra critically, attackers can modify or flip off firewall guidelines and safety insurance policies, successfully turning off community protections.

This opens the door to lateral motion all through the inner community, permitting attackers to unfold to different methods and exfiltrate priceless information.

In worst-case situations, attackers might utterly interrupt community companies or shut down vital infrastructure protected by the firewall.

GitHub-intimate organizations utilizing WatchGuard Firebox units ought to instantly verify their configurations. Change default SSH credentials instantly in the event that they haven’t been modified.

WatchGuard directors also needs to prohibit SSH entry on port 4118 if not required, or restrict it to approved IP addresses solely.

Verify WatchGuard’s safety advisories for firmware patches and comply with their remediation steerage. This vulnerability highlights the persistent risk posed by default credentials in community safety home equipment.

Firewall units, by their nature, defend vital community infrastructure; leaving them uncovered with default passwords primarily defeats their complete function.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, Firebox, Firewall, Gain, SSH, Unauthorized, Vulnerability, WatchGuard

Post navigation

Previous Post: Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
Next Post: Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Related Posts

New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Cyber Security News
Critical Flaw in Cisco IMC Software Exposes Systems Critical Flaw in Cisco IMC Software Exposes Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark