A new critical vulnerability, CVE-2025-9242, has been discovered in WatchGuard Firebox firewalls, putting thousands of networks worldwide at risk. The flaw stems from an out-of-bounds write bug in the Fireware OS’s iked process, which could allow a remote, unauthenticated attacker to execute arbitrary code. If exploited, this would grant full control of a device meant to protect the organization’s perimeter—a worst-case scenario for defenders.
The vulnerability specifically affects devices configured with IKEv2 VPNs, including both mobile user VPNs and branch office VPNs (BOVPNs) with dynamic gateway peers. Alarmingly, even devices that have had those configurations deleted may still remain vulnerable if they maintain a BOVPN with a static gateway peer.
WatchGuard has released security updates across multiple Fireware OS versions to address the flaw. However, older versions like Fireware 11.x remain end-of-life and require an upgrade to a supported release. For organizations unable to patch immediately, WatchGuard has also provided a temporary workaround—though experts warn it should only be used as a stopgap.
Security researchers stress the importance of patching quickly. Firewalls are a high-value target for attackers, and history shows how fast threat actors move to weaponize such vulnerabilities. Past examples include the Akira ransomware gang exploiting SonicWall flaws and earlier CISA directives mandating WatchGuard fixes. With WatchGuard firewalls deployed in more than 250,000 small and midsize businesses, the stakes could not be higher.
This episode examines what CVE-2025-9242 is, how it can be exploited, the systems at risk, and what organizations must do right now to stay secure.
#CVE20259242 #WatchGuard #Firebox #FirewallVulnerability #RemoteCodeExecution #CyberSecurity #VPN #PatchNow #ThreatIntelligence #CriticalVulnerability