New critical WatchGuard Firebox firewall flaw exploited in attacks
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是WatchGuard警告客户修补一个关键的远程代码执行漏洞CVE-2025-14733。这个漏洞影响了Firebox防火墙的多个版本,包括11.x、12.x和2025.1系列。攻击者可以利用这个漏洞在未经身份验证的情况下远程执行恶意代码,尤其是在配置了IKEv2 VPN的情况下。即使删除了易受攻击的配置,如果仍然配置了到静态网关对等体的分支办公室VPN,设备仍然可能被入侵。 此外,文章提到WatchGuard提供了临时解决方法,并分享了妥协指标来帮助检测是否被入侵。还提到了之前的一个类似漏洞CVE-2025-9242的影响范围和CISA的响应。 现在,我需要把这些信息浓缩到100字以内。重点包括:WatchGuard警告修补关键RCE漏洞CVE-2025-14733;影响Fireware OS 11.x及以上版本;攻击者可利用IKEv2 VPN配置远程执行代码;即使删除易受攻击配置,设备仍可能被入侵;建议立即修补或采取临时措施。 </think> WatchGuard警告客户修补关键远程代码执行漏洞CVE-2025-14733,影响Fireware OS 11.x及以上版本。攻击者可利用IKEv2 VPN配置远程执行恶意代码。即使删除易受攻击配置,设备仍可能被入侵。建议立即修补或采取临时措施。 2025-12-19 10:30:40 Author: www.bleepingcomputer.com(查看原文) 阅读量:16 收藏

WatchGuard

WatchGuard has warned customers to patch a critical, actively exploited remote code execution (RCE) vulnerability in its Firebox firewalls.

Tracked as CVE-2025-14733, this security flaw affects firewalls running Fireware OS 11.x and later (including 11.12.4_Update1), 12.x or later (including 12.11.5), and 2025.1 up to and including 2025.1.3.

The vulnerability is due to an out-of-bounds write weakness that enables unauthenticated attackers to execute malicious code remotely on unpatched devices, following successful exploitation in low-complexity attacks that don't require user interaction.

Wiz

While unpatched Firebox firewalls are only vulnerable to attacks if configured to use IKEv2 VPN, WatchGuard noted they might still be compromised, even if the vulnerable configurations have been deleted, if a branch office VPN to a static gateway peer is still configured.

"If the Firebox was previously configured with the mobile user VPN with IKEv2 or a branch office VPN using IKEv2 to a dynamic gateway peer, and both of those configurations have since been deleted, that Firebox may still be vulnerable if a branch office VPN to a static gateway peer is still configured," WatchGuard explained in a Thursday advisory. 

"WatchGuard has observed threat actors actively attempting to exploit this vulnerability in the wild," the company warned.

The company also provided a temporary workaround for organizations that can't immediately patch devices with vulnerable Branch Office VPN (BOVPN) configurations, requiring admins to disable dynamic peer BOVPNs, add new firewall policies, and disable the default system policies that handle VPN traffic.

Product Branch Vulnerable firewall models
Fireware OS 12.5.x T15, T35
Fireware OS 2025.1.x T115-W, T125, T125-W, T145, T145-W, T185
Fireware OS 12.x T20, T25, T40, T45, T55, T70, T80, T85, M270, M290, M370, M390, M470, M570, M590, M670, M690, M440, M4600, M4800, M5600, M5800, Firebox Cloud, Firebox NV5, FireboxV

WatchGuard shared indicators of compromise to help customers check whether their Firebox devices have been compromised, and advised those who find any signs of malicious activity to rotate all locally stored secrets on vulnerable appliances.

In September, WatchGuard patched another (almost identical) remote code execution vulnerability impacting its Firebox firewalls (CVE-2025-9242). One month later, the Internet watchdog Shadowserver found over 75,000 Firebox firewalls vulnerable to CVE-2025-9242 attacks, most of them in North America and Europe.

After three weeks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) tagged the vulnerability as actively exploited in the wild and ordered federal agencies to secure their WatchGuard Firebox firewalls from ongoing attacks.

Two years ago, CISA ordered U.S. government agencies to patch one more actively exploited WatchGuard flaw (CVE-2022-23176) impacting Firebox and XTM firewall appliances.

WatchGuard partners with more than 17,000 service providers and security resellers to protect the networks of over 250,000 small and mid-sized companies worldwide.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh