Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

Posted on November 11, 2025November 11, 2025 By CWS

A vital vulnerability in WatchGuard Firebox firewalls might permit attackers to achieve full administrative entry to the units with none authentication.

The flaw, tracked as CVE-2025-59396, stems from insecure default configurations that expose SSH entry on port 4118 utilizing hardcoded credentials.

WatchGuard Firebox home equipment by way of September 10, 2025, ship with default SSH credentials (admin:readwrite) that stay accessible on port 4118.

Because of this any attacker with community entry to the system can remotely join and achieve full administrative privileges.

The vulnerability requires no particular exploit instruments; easy SSH purchasers like PuTTY are enough to ascertain a connection.

Based on the advisory launched on GitHub, there’s a harmful misconfiguration that impacts your complete Firebox firewall collection.

AspectDetailsCVE IDCVE-2025-59396VendorWatchGuardProductFirebox SeriesAffected ComponentSSH Service (Port 4118)Assault VectorRemote unauthenticated accessCVSS ImpactsRCE, Privilege Escalation, Info Disclosure

WatchGuard Firebox Firewall Vulnerability

An unauthenticated distant attacker can retrieve delicate community data, together with ARP tables, community configurations, and person account particulars. They will additionally entry function keys and system location information.

Extra critically, attackers can modify or flip off firewall guidelines and safety insurance policies, successfully turning off community protections.

This opens the door to lateral motion all through the inner community, permitting attackers to unfold to different methods and exfiltrate priceless information.

In worst-case situations, attackers might utterly interrupt community companies or shut down vital infrastructure protected by the firewall.

GitHub-intimate organizations utilizing WatchGuard Firebox units ought to instantly verify their configurations. Change default SSH credentials instantly in the event that they haven’t been modified.

WatchGuard directors also needs to prohibit SSH entry on port 4118 if not required, or restrict it to approved IP addresses solely.

Verify WatchGuard’s safety advisories for firmware patches and comply with their remediation steerage. This vulnerability highlights the persistent risk posed by default credentials in community safety home equipment.

Firewall units, by their nature, defend vital community infrastructure; leaving them uncovered with default passwords primarily defeats their complete function.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, Firebox, Firewall, Gain, SSH, Unauthorized, Vulnerability, WatchGuard

Post navigation

Previous Post: Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
Next Post: Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Related Posts

New Malvertising Campaign Leverages GitHub Repository to Deliver Malware Cyber Security News
Threat Actors Attack PayPal Users in New Account Profile Set up Scam Cyber Security News
Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages Cyber Security News
Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects Cyber Security News
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year Cyber Security News
Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infostealer Malware Delivered in EmEditor Supply Chain Attack
  • Fresh MongoDB Vulnerability Exploited in Attacks
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
  • Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
  • MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infostealer Malware Delivered in EmEditor Supply Chain Attack
  • Fresh MongoDB Vulnerability Exploited in Attacks
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
  • Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
  • MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark