Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks

Posted on October 21, 2025October 21, 2025 By CWS

The Shadowserver Basis has uncovered greater than 71,000 internet-exposed WatchGuard gadgets operating susceptible variations of Fireware OS.

The flaw, tracked as CVE-2025-9242, stems from an out-of-bounds write vulnerability within the IKEv2 implementation, doubtlessly permitting distant attackers to execute arbitrary code with out authentication.

Disclosed earlier this 12 months, the problem highlights the risks of unpatched firewalls in enterprise environments, the place such gadgets usually function the primary line of protection in opposition to cyber threats.

Safety researchers first flagged CVE-2025-9242 in WatchGuard’s Fireware OS variations previous to 12.10.3, affecting a variety of the corporate’s widespread firewall fashions, together with the Firebox T-series and M-series home equipment.

The vulnerability arises through the processing of IKEv2 packets, the place improper bounds checking can result in reminiscence corruption. Attackers may exploit this remotely over the web, doubtlessly gaining full management of the system and pivoting to inside networks.

Whereas WatchGuard launched patches in March 2025, the sheer variety of uncovered situations suggests many organizations have but to use them, leaving essential infrastructure in danger.

WatchGuard Units Uncovered

The Shadowserver Basis, a nonprofit devoted to scanning for web vulnerabilities, started sharing every day IP knowledge on affected WatchGuard gadgets this week.

We are actually sharing every day IP knowledge on WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242 susceptible situations, with over 71 000 seen on 2025-10-18. Knowledge shared in our Weak ISAKMP reportings – High affected: US with 23.2K situations pic.twitter.com/dclXvC56jE— The Shadowserver Basis (@Shadowserver) October 19, 2025

Their October 18, 2025, report recognized over 71,000 susceptible hosts worldwide, a determine that underscores the worldwide scale of the issue. These scans give attention to ISAKMP (Web Safety Affiliation and Key Administration Protocol) visitors, the spine of VPN connections, the place the IKEv2 flaw resides.

Shadowserver’s knowledge, obtainable via their Weak ISAKMP reporting portal, contains anonymized IP addresses to assist community defenders determine and remediate their very own exposures.

Consultants warn that exploiting CVE-2025-9242 may allow devastating assaults, resembling ransomware deployment or knowledge exfiltration, particularly in sectors like healthcare and finance that rely closely on WatchGuard {hardware}.

The CVSS v3.1 base rating of 9.8 charges it as essential, emphasizing its ease of exploitation no person interplay required. Shadowserver famous a slight uptick in susceptible gadgets since preliminary disclosures, presumably because of newly deployed or misconfigured programs.

WatchGuard urges fast updates to Fireware OS 12.10.3 or later, alongside disabling IKEv2 if not important. Cybersecurity corporations like Rapid7 and Tenable have echoed these suggestions, advising organizations to audit their perimeters utilizing instruments like Shodan or Shadowserver’s feeds.

As risk actors more and more goal community edges amid rising geopolitical tensions, this incident serves as a wake-up name. With over 71,000 gadgets within the crosshairs, proactive protection stays the one protect in opposition to potential chaos.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:Attacks, Code, Devices, Execution, Remote, Vulnerable, WatchGuard

Post navigation

Previous Post: Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
Next Post: CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks

Related Posts

Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data Cyber Security News
Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News
Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Confirms Exploitation of Latest Oracle EBS Vulnerability 
  • ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
  • Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
  • Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
  • AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Confirms Exploitation of Latest Oracle EBS Vulnerability 
  • ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
  • Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
  • Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
  • AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News