Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

Posted on November 11, 2025November 11, 2025 By CWS

A vital vulnerability in WatchGuard Firebox firewalls might permit attackers to achieve full administrative entry to the units with none authentication.

The flaw, tracked as CVE-2025-59396, stems from insecure default configurations that expose SSH entry on port 4118 utilizing hardcoded credentials.

WatchGuard Firebox home equipment by way of September 10, 2025, ship with default SSH credentials (admin:readwrite) that stay accessible on port 4118.

Because of this any attacker with community entry to the system can remotely join and achieve full administrative privileges.

The vulnerability requires no particular exploit instruments; easy SSH purchasers like PuTTY are enough to ascertain a connection.

Based on the advisory launched on GitHub, there’s a harmful misconfiguration that impacts your complete Firebox firewall collection.

AspectDetailsCVE IDCVE-2025-59396VendorWatchGuardProductFirebox SeriesAffected ComponentSSH Service (Port 4118)Assault VectorRemote unauthenticated accessCVSS ImpactsRCE, Privilege Escalation, Info Disclosure

WatchGuard Firebox Firewall Vulnerability

An unauthenticated distant attacker can retrieve delicate community data, together with ARP tables, community configurations, and person account particulars. They will additionally entry function keys and system location information.

Extra critically, attackers can modify or flip off firewall guidelines and safety insurance policies, successfully turning off community protections.

This opens the door to lateral motion all through the inner community, permitting attackers to unfold to different methods and exfiltrate priceless information.

In worst-case situations, attackers might utterly interrupt community companies or shut down vital infrastructure protected by the firewall.

GitHub-intimate organizations utilizing WatchGuard Firebox units ought to instantly verify their configurations. Change default SSH credentials instantly in the event that they haven’t been modified.

WatchGuard directors also needs to prohibit SSH entry on port 4118 if not required, or restrict it to approved IP addresses solely.

Verify WatchGuard’s safety advisories for firmware patches and comply with their remediation steerage. This vulnerability highlights the persistent risk posed by default credentials in community safety home equipment.

Firewall units, by their nature, defend vital community infrastructure; leaving them uncovered with default passwords primarily defeats their complete function.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, Firebox, Firewall, Gain, SSH, Unauthorized, Vulnerability, WatchGuard

Post navigation

Previous Post: Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
Next Post: Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Related Posts

Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
OpenVPN Vulnerability Exposes Linux, MacOS Systems To Script Injection Attacks Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated? Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares
  • GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
  • Critical Triofox Vulnerability Exploited in the Wild
  • Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
  • Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares
  • GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
  • Critical Triofox Vulnerability Exploited in the Wild
  • Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
  • Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News