Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Posted on December 19, 2025December 19, 2025 By CWS

An pressing safety replace has been launched to repair a important zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw within the wild to take management of affected units.

The vulnerability, tracked as CVE-2025-14733, carries a important severity rating of 9.3 out of 10. It permits a distant attacker to execute malicious code on the firewall without having a username or password.

The problem is described as an “Out-of-bounds Write” vulnerability positioned within the ike course of, which handles VPN connections on the gadget.

Particularly, the flaw impacts the Cellular Person VPN and Department Workplace VPN (when utilizing IKEv2). It happens when the system tries to course of a connection request.

If an attacker sends a specifically crafted request, they will corrupt the system’s reminiscence and hijack the firewall.

WatchGuard famous that even after deleting a weak VPN configuration, your gadget could stay in danger if a Department Workplace VPN with a static gateway stays lively.

Lively 0-Day Exploitation Detected

WatchGuard confirmed they’ve “noticed menace actors actively making an attempt to use this vulnerability.” To assist directors defend their networks, they launched particular indicators of compromise (IoCs).

Suspicious IP Addresses:

Suspicious IP AddressIndicator45.95.19[.]50Strong signal of attack-related traffic51.15.17[.]89Strong signal of attack-related traffic172.93.107[.]67Strong signal of attack-related traffic199.247.7[.]82Strong signal of attack-related visitors

Directors ought to test their logs for:

IndicatorDescriptionLarge Certificates PayloadsLogs present an IKE_AUTH request with a CERT measurement better than 2000 bytesLong Certificates ChainsErrors report: “Acquired peer certificates chain is longer than 8”Course of CrashesThe iked course of out of the blue hangs or crashes, which can sign an exploit try

WatchGuard has launched software program updates to repair the difficulty. Admins ought to improve to the next variations instantly:

Present Fireware OS VersionRecommended Improve VersionFireware OS 2025.1Upgrade to 2025.1.4Fireware OS 12.xUpgrade to 12.11.6Fireware OS 12.5.x (T15/T35)Improve to 12.5.15

In case you discover proof that your gadget was focused, merely putting in the patch is just not sufficient. WatchGuard recommends rotating all shared secrets and techniques (passwords and keys) saved on the gadget, as attackers could have stolen them.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:0Day, Exploited, Firewalls, Hijack, Vulnerability, WatchGuard, Wild

Post navigation

Previous Post: New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
Next Post: North Korean Hackers Make History with $2 Billion Crypto Heist in 2025

Related Posts

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys Cyber Security News
Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News
Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark