WatchGuard Fireware OS Vulnerability

CRITICAL (9.8) Partial Fix

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.21% chance of exploitation (percentile: 43%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

The WatchGuard Fireware OS is a network security platform used to manage and secure networks. This vulnerability allows remote unauthenticated attackers to execute arbitrary code on the device by exploiting an out-of-bounds write in the iked process, which handles IKEv2 authentication.

Am I affected?

You're affected if you use An Out-of-bounds Write vulnerability. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

To fix this vulnerability, upgrade to a newer version of WatchGuard Fireware OS. You can download the latest patch from the WatchGuard website:

  • For Firebox appliances: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027
  • For Fireware OS 12.0 and later, you can also apply the patch by running the following command:
    bash sudo /opt/firewall/iked -c /var/log/iked.log
    If an upgrade isn't possible immediately, consider the following immediate mitigations:

  • Restrict network access to your Firebox appliance (firewall it from the public internet).

  • Audit admin account activity for suspicious access patterns.
  • Monitor for unauthorized token creation.