Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsThreat Actors Exploit Zero-Day in WatchGuard Firebox Devices
Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices
Cybersecurity

Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices

•December 22, 2025
0
Dark Reading
Dark Reading•Dec 22, 2025

Companies Mentioned

Fortinet

Fortinet

FTNT

SonicWall

SonicWall

SNWL

Alamy

Alamy

Why It Matters

Exploitation of this edge‑device flaw threatens corporate VPN integrity and can serve as a foothold for broader network breaches, underscoring the urgency for rapid patching across the security ecosystem.

Key Takeaways

  • •WatchGuard Firebox zero‑day CVE‑2025‑14733 disclosed.
  • •Active exploitation observed across multiple edge‑device vendors.
  • •Patch released 18 December; immediate upgrade urged.
  • •Shadowserver found 125k vulnerable devices, 35k in US.
  • •IKE daemon hangs indicate successful exploitation.

Pulse Analysis

The emergence of a zero‑day in WatchGuard’s Firebox line highlights a growing pattern of attackers targeting edge infrastructure. Over the past month, vendors from Fortinet to SonicWall have seen similar critical flaws, reflecting the strategic value of firewalls and VPN gateways as entry points into corporate networks. As organizations increasingly rely on remote access, the attack surface expands, prompting threat actors to hunt for unpatched firmware that can bypass traditional perimeter defenses.

Technically, CVE‑2025‑14733 exploits an out‑of‑bounds write in the Fireware OS’s IKE daemon, corrupting memory and allowing arbitrary code execution. The vulnerability disrupts IKE negotiations, causing the IKED process to hang and potentially leaving VPN tunnels in a degraded state while traffic continues. Indicators such as outbound connections to known malicious IPs and stalled VPN re‑keys serve as early warning signs for security teams monitoring for compromise.

Mitigation efforts focus on swift patch deployment, which WatchGuard made available within three days of discovery. For environments unable to patch immediately, a temporary workaround limits exposure by restricting configurations to static‑gateway VPN peers. The broader industry response emphasizes the need for continuous vulnerability management, automated patching pipelines, and enhanced monitoring of edge devices to prevent similar campaigns from gaining a foothold in the future.

Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...