Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Posted on December 19, 2025December 19, 2025 By CWS

An pressing safety replace has been launched to repair a important zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw within the wild to take management of affected units.

The vulnerability, tracked as CVE-2025-14733, carries a important severity rating of 9.3 out of 10. It permits a distant attacker to execute malicious code on the firewall without having a username or password.

The problem is described as an “Out-of-bounds Write” vulnerability positioned within the ike course of, which handles VPN connections on the gadget.

Particularly, the flaw impacts the Cellular Person VPN and Department Workplace VPN (when utilizing IKEv2). It happens when the system tries to course of a connection request.

If an attacker sends a specifically crafted request, they will corrupt the system’s reminiscence and hijack the firewall.

WatchGuard famous that even after deleting a weak VPN configuration, your gadget could stay in danger if a Department Workplace VPN with a static gateway stays lively.

Lively 0-Day Exploitation Detected

WatchGuard confirmed they’ve “noticed menace actors actively making an attempt to use this vulnerability.” To assist directors defend their networks, they launched particular indicators of compromise (IoCs).

Suspicious IP Addresses:

Suspicious IP AddressIndicator45.95.19[.]50Strong signal of attack-related traffic51.15.17[.]89Strong signal of attack-related traffic172.93.107[.]67Strong signal of attack-related traffic199.247.7[.]82Strong signal of attack-related visitors

Directors ought to test their logs for:

IndicatorDescriptionLarge Certificates PayloadsLogs present an IKE_AUTH request with a CERT measurement better than 2000 bytesLong Certificates ChainsErrors report: “Acquired peer certificates chain is longer than 8”Course of CrashesThe iked course of out of the blue hangs or crashes, which can sign an exploit try

WatchGuard has launched software program updates to repair the difficulty. Admins ought to improve to the next variations instantly:

Present Fireware OS VersionRecommended Improve VersionFireware OS 2025.1Upgrade to 2025.1.4Fireware OS 12.xUpgrade to 12.11.6Fireware OS 12.5.x (T15/T35)Improve to 12.5.15

In case you discover proof that your gadget was focused, merely putting in the patch is just not sufficient. WatchGuard recommends rotating all shared secrets and techniques (passwords and keys) saved on the gadget, as attackers could have stolen them.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:0Day, Exploited, Firewalls, Hijack, Vulnerability, WatchGuard, Wild

Post navigation

Previous Post: New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
Next Post: North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

Related Posts

AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 Cyber Security News
Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Cyber Security News
1.5 Billion Packets Per Second DDoS Attack Detected with FastNetMon Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark