The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added a vital safety flaw impacting WatchGuard Fireware to its Recognized Exploited Vulnerabilities (KEV) catalog, primarily based on proof of lively exploitation.
The vulnerability in query is CVE-2025-9242 (CVSS rating: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 as much as and together with 11.12.4_Update1, 12.0 as much as and together with 12.11.3 and 2025.1.
“WatchGuard Firebox incorporates an out-of-bounds write vulnerability within the OS iked course of that will permit a distant unauthenticated attacker to execute arbitrary code,” CISA stated in an advisory.
Particulars of the vulnerability have been shared by watchTowr Labs final month, with the cybersecurity firm stating that the difficulty stems from a lacking size verify on an identification buffer used in the course of the IKE handshake course of.
“The server does try certificates validation, however that validation occurs after the weak code runs, permitting our weak code path to be reachable pre-authentication,” safety researcher McCaulay Hudson famous.
There are at the moment no particulars on how the safety defect is being exploited and what is the scale of such efforts. In keeping with knowledge from the Shadowserver Basis, greater than 54,300 Firebox situations stay weak to the vital bug as of November 12, 2025, down from a excessive of 75,955 on October 19.
Roughly 18,500 of those units are within the U.S., the scans reveal. Italy (5,400), the U.Okay. (4,000), Germany (3,600), and Canada (3,000) spherical up the highest 5. Federal Civilian Govt Department (FCEB) companies are suggested to use WatchGuard’s patches by December 3, 2025.
The event comes as CISA additionally added CVE-2025-62215 (CVSS rating: 7.0), a lately disclosed flaw in Home windows kernel, and CVE-2025-12480 (CVSS rating: 9.1), an improper entry management vulnerability in Gladinet Triofox, to the KEV catalog. Google’s Mandiant Menace Protection group has attributed the exploitation of CVE-2025-12480 to a risk actor it tracks as UNC6485.

