Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Posted on December 19, 2025December 19, 2025 By CWS

An pressing safety replace has been launched to repair a important zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw within the wild to take management of affected units.

The vulnerability, tracked as CVE-2025-14733, carries a important severity rating of 9.3 out of 10. It permits a distant attacker to execute malicious code on the firewall without having a username or password.

The problem is described as an “Out-of-bounds Write” vulnerability positioned within the ike course of, which handles VPN connections on the gadget.

Particularly, the flaw impacts the Cellular Person VPN and Department Workplace VPN (when utilizing IKEv2). It happens when the system tries to course of a connection request.

If an attacker sends a specifically crafted request, they will corrupt the system’s reminiscence and hijack the firewall.

WatchGuard famous that even after deleting a weak VPN configuration, your gadget could stay in danger if a Department Workplace VPN with a static gateway stays lively.

Lively 0-Day Exploitation Detected

WatchGuard confirmed they’ve “noticed menace actors actively making an attempt to use this vulnerability.” To assist directors defend their networks, they launched particular indicators of compromise (IoCs).

Suspicious IP Addresses:

Suspicious IP AddressIndicator45.95.19[.]50Strong signal of attack-related traffic51.15.17[.]89Strong signal of attack-related traffic172.93.107[.]67Strong signal of attack-related traffic199.247.7[.]82Strong signal of attack-related visitors

Directors ought to test their logs for:

IndicatorDescriptionLarge Certificates PayloadsLogs present an IKE_AUTH request with a CERT measurement better than 2000 bytesLong Certificates ChainsErrors report: “Acquired peer certificates chain is longer than 8”Course of CrashesThe iked course of out of the blue hangs or crashes, which can sign an exploit try

WatchGuard has launched software program updates to repair the difficulty. Admins ought to improve to the next variations instantly:

Present Fireware OS VersionRecommended Improve VersionFireware OS 2025.1Upgrade to 2025.1.4Fireware OS 12.xUpgrade to 12.11.6Fireware OS 12.5.x (T15/T35)Improve to 12.5.15

In case you discover proof that your gadget was focused, merely putting in the patch is just not sufficient. WatchGuard recommends rotating all shared secrets and techniques (passwords and keys) saved on the gadget, as attackers could have stolen them.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:0Day, Exploited, Firewalls, Hijack, Vulnerability, WatchGuard, Wild

Post navigation

Previous Post: New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
Next Post: North Korean Hackers Make History with $2 Billion Crypto Heist in 2025

Related Posts

VECT 2.0 Ransomware: A Destructive Threat to Data VECT 2.0 Ransomware: A Destructive Threat to Data Cyber Security News
BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features Cyber Security News
Belarusian Spyware ResidentBat Targets Journalists with Precision Belarusian Spyware ResidentBat Targets Journalists with Precision Cyber Security News
FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests Cyber Security News
Global Effort Shuts Down 45,000 Malicious IPs in Cybercrime Sweep Global Effort Shuts Down 45,000 Malicious IPs in Cybercrime Sweep Cyber Security News
Advanced Linux Rootkits Exploit eBPF and io_uring Advanced Linux Rootkits Exploit eBPF and io_uring Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark