Vulnerabilites related to WatchGuard - Fireware OS
CVE-2025-1071 (GCVE-0-2025-1071)
Vulnerability from cvelistv5
Published
2025-02-14 13:20
Modified
2025-02-14 14:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:04:09.605821Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:05:47.670Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Simone Paganessi (https://www.linkedin.com/in/simonepaganessi)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:20:48.780Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00001" } ], "source": { "advisory": "WGSA-2025-00001", "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in spamBlocker Module", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-1071", "datePublished": "2025-02-14T13:20:48.780Z", "dateReserved": "2025-02-05T22:05:32.462Z", "dateUpdated": "2025-02-14T14:05:47.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1239 (GCVE-0-2025-1239)
Vulnerability from cvelistv5
Published
2025-02-14 13:21
Modified
2025-02-14 14:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1239", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:02:35.988330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:03:04.820Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Simone Paganessi (https://www.linkedin.com/in/simonepaganessi)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:21:39.330Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00002" } ], "source": { "advisory": "WGSA-2025-00002", "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Blocked Sites List", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-1239", "datePublished": "2025-02-14T13:21:09.213Z", "dateReserved": "2025-02-11T19:40:39.287Z", "dateUpdated": "2025-02-14T14:03:04.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6999 (GCVE-0-2025-6999)
Vulnerability from cvelistv5
Published
2025-09-15 21:17
Modified
2025-09-16 15:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Summary
An HTTP Request Smuggling [CWE-444] vulnerability in the Authentication portal of WatchGuard Fireware OS allows a remote attacker to evade request parameter sanitation and perform a reflected self-Cross-Site Scripting (XSS) attack.This issue affects Fireware OS: from 12.0 through 12.11.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.11.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6999", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-16T15:21:28.951934Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-16T15:41:45.704Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.11.2", "status": "affected", "version": "12.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:12.0", "versionEndIncluding": "12.11.2", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "OR" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An HTTP Request Smuggling [CWE-444] vulnerability in the Authentication portal of WatchGuard Fireware OS allows a remote attacker to evade request parameter sanitation and perform a reflected self-Cross-Site Scripting (XSS) attack.\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.11.2.\u003c/p\u003e" } ], "value": "An HTTP Request Smuggling [CWE-444] vulnerability in the Authentication portal of WatchGuard Fireware OS allows a remote attacker to evade request parameter sanitation and perform a reflected self-Cross-Site Scripting (XSS) attack.This issue affects Fireware OS: from 12.0 through 12.11.2." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T21:17:51.424Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00014" } ], "source": { "advisory": "WGSA-2025-00014", "defect": [ "FBX-28178" ], "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Authentication Portal Request Smuggling Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-6999", "datePublished": "2025-09-15T21:17:51.424Z", "dateReserved": "2025-07-02T00:11:51.723Z", "dateUpdated": "2025-09-16T15:41:45.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6947 (GCVE-0-2025-6947)
Vulnerability from cvelistv5
Published
2025-09-15 21:18
Modified
2025-09-16 13:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the SIP Proxy module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.
This issue affects Firebox: from 12.0 through 12.11.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.11.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6947", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-16T13:50:42.359475Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-16T13:50:53.924Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.11.2", "status": "affected", "version": "12.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:watchguard:firebox:*:*:*:*:*:*:*:12.0", "versionEndIncluding": "12.11.2", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "OR" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the SIP Proxy module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cbr\u003e\u003cbr\u003eThis issue affects Firebox: from 12.0 through 12.11.2.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the SIP Proxy module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\n\nThis issue affects Firebox: from 12.0 through 12.11.2." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T21:18:36.390Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00012" } ], "source": { "advisory": "WGSA-2025-00012", "defect": [ "FBX-28895" ], "discovery": "UNKNOWN" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in SIP Proxy Configuration", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-6947", "datePublished": "2025-09-15T21:18:36.390Z", "dateReserved": "2025-07-01T02:34:13.150Z", "dateUpdated": "2025-09-16T13:50:53.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0178 (GCVE-0-2025-0178)
Vulnerability from cvelistv5
Published
2025-02-14 13:22
Modified
2025-02-14 14:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.
This issue affects Fireware OS: from 12.0 up to and including 12.11.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.5.12+701324 Version: 12.6.0 ≤ 12.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0178", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T14:01:22.671243Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T14:01:35.532Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+701324", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "12.11", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 12.0 up to and including 12.11.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\nThis issue affects Fireware OS: from 12.0 up to and including 12.11." } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-14T13:22:22.237Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003" } ], "source": { "advisory": "WGSA-2025-00003", "discovery": "EXTERNAL" }, "title": "WatchGaurd Firebox Host Header Injection Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-0178", "datePublished": "2025-02-14T13:22:22.237Z", "dateReserved": "2025-01-02T19:07:31.451Z", "dateUpdated": "2025-02-14T14:01:35.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9242 (GCVE-0-2025-9242)
Vulnerability from cvelistv5
Published
2025-09-17 07:29
Modified
2025-09-18 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.11.3 Version: 11.10.2 ≤ 11.12.4+541730 Version: 2025.1 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9242", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-18T03:55:13.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.11.3", "status": "affected", "version": "12.0", "versionType": "semver" }, { "lessThanOrEqual": "11.12.4+541730", "status": "affected", "version": "11.10.2", "versionType": "semver" }, { "lessThan": "2025.1.1", "status": "affected", "version": "2025.1", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:12.0", "versionEndIncluding": "12.11.3", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:11.10.2", "versionEndIncluding": "11.12.4+541730", "versionStartIncluding": "11.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "2025.1.1", "versionStartIncluding": "2025.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "OR" } ], "credits": [ { "lang": "en", "type": "finder", "value": "btaol" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.\u003cp\u003eThis vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1.\u003c/p\u003e" } ], "value": "An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and 2025.1." } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-17T07:41:47.827Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015" } ], "source": { "advisory": "WGSA-2025-00015", "defect": [ "FBX-30275" ], "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox iked Out of Bounds Write Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-9242", "datePublished": "2025-09-17T07:29:23.738Z", "dateReserved": "2025-08-20T11:08:20.724Z", "dateUpdated": "2025-09-18T03:55:13.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31749 (GCVE-0-2022-31749)
Vulnerability from cvelistv5
Published
2025-01-27 23:28
Modified
2025-01-28 15:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Summary
An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 0 < 12.8.1 Version: 12.x < 12.1.4 Version: 12.2.x < 12.5.x Version: 12.5.10 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-31749", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:09:59.502452Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:18:35.068Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThan": "12.8.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "12.1.4", "status": "affected", "version": "12.x", "versionType": "custom" }, { "lessThan": "12.5.x", "status": "affected", "version": "12.2.x", "versionType": "custom" }, { "status": "affected", "version": "12.5.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jake Baines, Rapid7" } ], "datePublic": "2022-06-23T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003eAn argument injection vulnerability in the \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003ediagnose\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003e and \u003c/span\u003e\u003ctt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003eimport pac\u003c/span\u003e\u003c/tt\u003e\u003cspan style=\"background-color: rgb(248, 248, 248);\"\u003e commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ean authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances" } ], "impacts": [ { "capecId": "CAPEC-6", "descriptions": [ { "lang": "en", "value": "CAPEC-6 Argument Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T23:29:05.736Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "url": "https://www.rapid7.com/blog/post/2022/06/23/cve-2022-31749-watchguard-authenticated-arbitrary-file-read-write-fixed/" }, { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00019" } ], "source": { "discovery": "EXTERNAL" }, "title": "Authenticated arbitrary file read/write in WatchGuard Fireware OS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2022-31749", "datePublished": "2025-01-27T23:28:40.596Z", "dateReserved": "2022-05-26T17:58:55.663Z", "dateUpdated": "2025-01-28T15:18:35.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4805 (GCVE-0-2025-4805)
Vulnerability from cvelistv5
Published
2025-05-16 20:13
Modified
2025-09-19 16:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS. This vulnerability requires an authenticated administrator session to a locally managed Firebox.
This issue affects Fireware OS: from 12.0 through 12.11.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.11.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4805", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-17T02:27:12.386429Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-17T02:27:32.065Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.11.1", "status": "affected", "version": "12.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Simone Paganessi (https://www.linkedin.com/in/simonepaganessi)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.11.1.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\nThis issue affects Fireware OS: from 12.0 through 12.11.1." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-19T16:26:29.751Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00007" } ], "source": { "advisory": "WGSA-2025-00007", "defect": [ "FBX-28645" ], "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Acces Portal Configuration", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-4805", "datePublished": "2025-05-16T20:13:47.615Z", "dateReserved": "2025-05-16T00:31:33.445Z", "dateUpdated": "2025-09-19T16:26:29.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5974 (GCVE-0-2024-5974)
Vulnerability from cvelistv5
Published
2024-07-09 02:24
Modified
2025-01-13 17:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.
This issue affects Fireware OS: from 11.9.6 through 12.10.3.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 11.9.6 ≤ 12.5.12+687697 Version: 12.6.0 ≤ 12.10.3 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fireware", "vendor": "watchguard", "versions": [ { "lessThanOrEqual": "12.5.12_Update1", "status": "affected", "version": "11.9.4", "versionType": "semver" }, { "lessThanOrEqual": "12.10.3", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5974", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T14:17:18.190367Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T14:32:08.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.5.12+687697", "status": "affected", "version": "11.9.6", "versionType": "semver" }, { "lessThanOrEqual": "12.10.3", "status": "affected", "version": "12.6.0", "versionType": "semver" } ] } ], "datePublic": "2024-06-27T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 11.9.6 through 12.10.3.\u003c/p\u003e" } ], "value": "A buffer overflow in WatchGuard Fireware OS could may allow an authenticated remote attacker with privileged management access to execute arbitrary code with system privileges on the firewall.\nThis issue affects Fireware OS: from 11.9.6 through 12.10.3." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-13T17:56:13.317Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00011" } ], "source": { "advisory": "wgsa-2024-00011", "discovery": "INTERNAL" }, "title": "Firebox Authenticated Buffer Overflow Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2024-5974", "datePublished": "2024-07-09T02:24:47.924Z", "dateReserved": "2024-06-13T15:15:57.213Z", "dateUpdated": "2025-01-13T17:56:13.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4804 (GCVE-0-2025-4804)
Vulnerability from cvelistv5
Published
2025-05-16 20:12
Modified
2025-05-17 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.
This issue affects Fireware OS: from 12.0 through 12.11.1.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WatchGuard | Fireware OS |
Version: 12.0 ≤ 12.11.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4804", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-17T02:28:17.397984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-17T02:28:29.225Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [ { "lessThanOrEqual": "12.11.1", "status": "affected", "version": "12.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\u003cbr\u003e\u003cp\u003eThis issue affects Fireware OS: from 12.0 through 12.11.1.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.\nThis issue affects Fireware OS: from 12.0 through 12.11.1." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T20:12:44.848Z", "orgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "shortName": "WatchGuard" }, "references": [ { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00006" } ], "source": { "advisory": "WGSA-2025-00006", "defect": [ "FBX-28548" ], "discovery": "EXTERNAL" }, "title": "WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Hotpot Configuration", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5d1c2695-1a31-4499-88ae-e847036fd7e3", "assignerShortName": "WatchGuard", "cveId": "CVE-2025-4804", "datePublished": "2025-05-16T20:12:44.848Z", "dateReserved": "2025-05-16T00:27:06.016Z", "dateUpdated": "2025-05-17T02:28:29.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }