CVE-2025-14733
Published Dec 19, 2025
Last updated 2 months ago
AI description
CVE-2025-14733 is a zero-day vulnerability affecting WatchGuard Firebox firewall appliances. It is an out-of-bounds write flaw in the `iked` process, which handles IKEv2 VPN negotiations. This vulnerability allows remote, unauthenticated attackers to execute arbitrary code and seize control of affected devices. The vulnerability impacts Firebox appliances configured for Mobile User VPNs using IKEv2 or Branch Office VPNs using IKEv2 with a dynamic gateway peer. By sending a specially crafted request to the firewall, an attacker can trigger a memory corruption error, leading to arbitrary code execution. Even if a vulnerable VPN configuration was previously deleted, the device may still be at risk if a static branch office VPN remains configured.
- Description
- An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.
- Source
- 5d1c2695-1a31-4499-88ae-e847036fd7e3
- NVD status
- Analyzed
- Products
- fireware
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- WatchGuard Firebox Out of Bounds Write Vulnerability
- Exploit added on
- Dec 19, 2025
- Exploit action due
- Dec 26, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- 5d1c2695-1a31-4499-88ae-e847036fd7e3
- CWE-787
- Hype score
- Not currently trending
اکانتهای بهاصطلاح سایبری دارن VPN و تونلینگ رو تبلیغ میکنن، درحالیکه VPN اگه پچ و درست کانفیگ نشه میتونه از اینترنت محدود هم خطرناکتر باشه؛ چون تون
@DNSecAnon
20 Jan 2026
567 Impressions
2 Retweets
2 Likes
0 Bookmarks
1 Reply
1 Quote
WatchGuard Firebox脆弱性(CVE-2025-14733)。IPA警告。またか…。対象者は速攻で対応な。後で知らんぞ。😒 https://t.co/F6yoOJZLzx
@cloudrenam
20 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard released fixes for CVE-2025-14733, a critical out-of-bounds write vulnerability in the Internet Key Exchange daemon (iked) process used to establish VPN tunnels in Fireware OS. https://t.co/Dx4iNbxO4w
@de_do20
15 Jan 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireboxの脆弱性対策について(CVE-2025-14733) https://t.co/4DzVEaci9e
@InfoEmission
7 Jan 2026
118 Impressions
0 Retweets
16 Likes
0 Bookmarks
0 Replies
0 Quotes
統合版 JPCERT/CC | Weekly Report: WatchGuard製Fireboxのikedにおける境界外書き込みの脆弱性(CVE-2025-14733)に関する注意喚起 https://t.co/96TcF7vjbI #itsec_jp
@itsec_jp
7 Jan 2026
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#WatchGuard released fixes for CVE-2025-14733, a critical out-of-bounds write vulnerability in the Internet Key Exchange daemon (iked) process used to establish VPN tunnels in Fireware OS. #arcticwolf #patchnow https://t.co/DSh2Z8frZI
@ervik
6 Jan 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireboxの脆弱性対策について(CVE-2025-14733) https://t.co/FpHD3BVDTp
@ICATalerts
6 Jan 2026
1584 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
1 Quote
WatchGuard Firebox の脆弱性 CVE-2025-14733:大規模な悪用試行を観測 https://t.co/p97oEBZVQU この問題の原因は、IKEv2 VPN
@iototsecnews
5 Jan 2026
126 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard のゼロデイ CVE-2025-14733 が FIX:RCE によるデバイス乗っ取りの恐れ https://t.co/oB0pJvNnfc この問題の原因は、VPN の接続リクエストを処理する、”iked” というプログラムの設計不備にあります。具体的には
@iototsecnews
5 Jan 2026
114 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 4 🔥 ACTIVE: • Emotet C2: 167.86.75.145 • Mozi botnet surge • Banking trojans ⚠️ PATCH NOW: • MongoDB CVE-2025-14847 • WatchGuard CVE-2025-14733 • ASUS CVE-2025-59374 #ThreatIntel #InfoSec
@404LABSx
4 Jan 2026
123 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA has added CVE-2025-14733 to its Known Exploited Vulnerabilities catalog, highlighting a critical out-of-bounds write vulnerability in WatchGuard Fireware OS. This flaw resides in the iked process, which handles IKEv2-based Virtual Private Network (VPN) connections. Attackers
@ox0ffff
4 Jan 2026
127 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireware CVE-2025-14733: Out-of-Bounds Write in iked Enables Unauthenticated RCE on 117,490+ Exposed Firewalls - https://t.co/ayZd0LgZJq
@Cyberwarzonecom
3 Jan 2026
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The 2026 Firebox Emergency: How CVE-2025-14733 Grants Unauthenticated Root Access to Your Entire Network Read the full report on - https://t.co/MuWxu6R966 https://t.co/isQlNU4dmV
@cyberbivash
2 Jan 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة CVE-2025-14733 في WatchGuard Firebox (كتابة خارج الحدود) تُستغل حاليًا في هجمات فعلية#الأمن_السيبراني #Vulnerability #WatchGuard https://t.co/CEowY87R2C
@fad_777
1 Jan 2026
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-14733: WatchGuard Firebox iked Out of Bounds Write Vulnerability Exploited in the Wild https://t.co/en5GIAmPKp
@Dinosn
30 Dec 2025
1116 Impressions
2 Retweets
4 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 WatchGuard Firebox Zero-Day (CVE-2025-14733) Actively Exploited in the Wild WatchGuard warns attackers are exploiting a critical out-of-bounds write in Fireware OS’s iked process that can enable unauthenticated RCE on Firebox devices, especially when IKEv2 Mobile User VPN
@ThreatSynop
30 Dec 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Patch now: WatchGuard Firebox RCE under active exploitation (CVE-2025-14733).
@InfosecDotWatch
29 Dec 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**WatchGuard Firebox Exploit** WatchGuard Firebox firewalls are under active attack via CVE-2025-14733 (critical RCE in IKEv2 VPN). Over 115,000 exposed devices vulnerable. Threat actors already exploiting for arbitrary code exec. Patch immediately if you're running affected http
@BreachBrief
29 Dec 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#ITSecurity More than 115,000 internet-facing WatchGuard Firebox firewalls may be vulnerable to compromise via CVE-2025-14733, a remote code execution vulnerability actively targeted by attackers, Shadowserver’s latest scanning reveals. https://t.co/Yc52DcXDnx
@seaarepea
28 Dec 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Firebox VPN Hijack (CVE-2025-14733) Read the full report on - https://t.co/tFVnLo8xMf https://t.co/wxSFnTR19C
@cyberbivash
28 Dec 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 WatchGuard Fireware OS [—] Dec 28, 2025 Comprehensive Security Advisory: Active Exploitation of CVE-2025-14733 and Fireware OS Emergency Patching Checkout our Threat Intelligence Platform: https://t.co/QuwNtEhw6z https://t.co/QuwNtEhw6z #LLM https://t.co/FwcWqApJkT
@transilienceai
28 Dec 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Firebox (CVE-2025-14733): internet-facing IKEv2 VPN can be hit for unauth RCE. Fix: upgrade Fireware to patched builds ASAP; if you can’t, disable IKEv2 dynamic-peer VPNs + check devices for compromise. Refs: CISA, WatchGuard
@nakultomar___
28 Dec 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
WatchGuard alerta: CVE-2025-14733 (CVSS 9.3) en Fireware OS VPN explotada activamente. ¡Aplica parches y refuerza mitigaciones YA! #Ciberseguridad #WatchGuard https://t.co/ckyJTM4A14
@trustlock_sec
26 Dec 2025
4 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
#threatreport #LowCompleteness CVE-2025-14733: WatchGuard Firebox RCE Vulnerability | 24-12-2025 Source: https://t.co/SUgBbHHOjJ Key details below ↓ 🔓CVEs: CVE-2025-14733 \[[Vulners](https://t.co/zMOyqU73zA)] - CVSS V3.1: *9.8*, - Vulners: Exploitation: True Soft:
@rst_cloud
25 Dec 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 WatchGuard Firebox [—] Dec 25, 2025 Comprehensive product security advisory for WatchGuard Firebox, focusing on current critical vulnerabilities (CVE-2025-14733), active exploitation campaigns, patch status, mitigation strategies, and best practices as of December 25, 2025
@transilienceai
25 Dec 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 WatchGuard Firebox Zero-Day Under Active Exploitation (CVE-2025-14733) — Patch IKEv2 Now Attackers are exploiting a critical out-of-bounds write in Fireware OS’s IKED (IKE daemon) that can enable unauthenticated remote code execution on Firebox devices, especially where
@ThreatSynop
24 Dec 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 WatchGuard Patches Firebox Zero-Day CVE-2025-14733 Exploited In The Wild WatchGuard fixed CVE-2025-14733 (CVSS 9.3), an out-of-bounds write in Fireware OS’s iked (IKEv2) process that enables unauthenticated remote code execution, with active exploitation observed and ~125,
@ThreatSynop
24 Dec 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
کمپانی WatchGuard در خصوص انتشار آسیب پذیری برای فایروال های Firebox هشدار داده است. آسیب پذیری که از نوع RCE می باشد ، دارای کد شناسایی CVE-2025-14733 بود و تمامی فایروال ه
@AmirHossein_sec
24 Dec 2025
102 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Since Dec 22, we've seen a surge in critical exploits: ✔️ HPE OneView: CVSS 10/10 (CVE-2025-37164) ✔️ WatchGuard Firebox: 117k+ devices exposed (CVE-2025-14733) ✔️ Cisco & Apple WebKit zero-days actively abused. If you aren't patching today, you're the tar
@CyberWolfGuard
24 Dec 2025
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Over 115,000 WatchGuard Firebox devices exposed online remain unpatched against a critical remote code execution (RCE) vulnerability actively exploited in attacks. The security flaw, tracked as CVE-2025-14733, affects Firebox firewalls Fireware OS 11.x. https://t.co/1UKCIU4J6X ht
@riskigy
24 Dec 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡️ Cybersecurity Developments in the Last 12 Hours ⚡️ 🚨 WatchGuard disclosed CVE-2025-14733, a critical 9.3 RCE in Firebox firewalls that is being actively exploited and leaves 117K+ devices exposed. 🔒 Two malicious Chrome extensions in the Web Store ('Phantom Shu
@greytech_ltd
23 Dec 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical vulnerability (CVE-2025-14733) impacting WatchGuard Fireware OS IKEv2 VPN is being actively exploited in the wild: no auth, no user interaction required. Huge shoutout to Nick Berrie, who wrote the post and broke down what we know and what to do next 👏 👉 Read m
@SprocketSec
23 Dec 2025
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical RCE vulnerability (CVE-2025-14733) impacting WatchGuard Fireware OS IKEv2 VPN is being actively exploited in the wild — no auth, no user interaction required. Huge shoutout to Nick Berrie, who wrote the post and broke down what we know and what to do next 👏 👉
@SprocketSec
23 Dec 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Active exploitation alerts continue: - Critical RCE zero-day (CVE-2025-14733) hitting - WatchGuard Firebox firewalls – >115k devices still exposed! Patch ASAP (CISA KEV added) - More edge appliances under fire (SonicWall, Fortinet chains) - France's postal/banking services
@ImperialTechSvc
23 Dec 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical RCE detected in WatchGuard Firebox (CVE-2025-14733). This active threat allows unauthenticated attackers to execute arbitrary code via the IKEv2 VPN component, leading to potential full device compromise. CISA has confirmed active exploitation. Patch immediately. Read
@socradar
23 Dec 2025
214 Impressions
0 Retweets
2 Likes
1 Bookmark
1 Reply
0 Quotes
WatchGuard has issued a critical security patch for a remote code execution vulnerability in Firebox firewalls (CVE-2025-14733). The severity score is 9.3/10, and it is actively being exploited. #WatchGuard #security #patch https://t.co/zx0SUUsP2E
@ProgresiveRobot
23 Dec 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireboxの重大RCE脆弱性CVE-2025-14733が未対策11万超 https://t.co/x3DXqo0X63 #Security #セキュリティー #ニュース
@SecureShield_
23 Dec 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireboxに認証不要で任意コード実行の脆弱性(CVE-2025-14733)-サイバー攻撃へ悪用の恐れ https://t.co/ZwL0siUQIC #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃
@securityLab_jp
23 Dec 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Fireboxのikedに境界外書き込み脆弱性(CVE-2025-14733) https://t.co/FsDMZzlkuV WatchGuard
@cloudsec_news
22 Dec 2025
74 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard製Fireboxのikedにおける境界外書き込みの脆弱性(CVE-2025-14733)に関する注意喚起 #JPCERTCC (Dec 22) https://t.co/gN9sAw1YsO
@foxbook
22 Dec 2025
299 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
2025.12.22 WatchGuard製Fireboxのikedにおける境界外書き込みの脆弱性(CVE-2025-14733)に関する注意喚起 - 一般社団法人 JPCERT コーディネーションセンター(JPCERT/CC) https://t.co/GctwBlmOt8
@kawn2020
22 Dec 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-14733 in WatchGuard Firebox firewalls leaves ~125,000 IPs exposed to unauthenticated remote code execution, with CISA warning of active exploitation of unpatched devices. #Vulnerability https://t.co/9gIt25O8dr
@threatcluster
22 Dec 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔐 SECURITY WIRE 1️⃣ 🛡️ WatchGuard Firebox Alert CVE-2025-14733 under active exploitation. Patch exposed firewalls now. 2️⃣ 🇦🇺 University of Sydney Breach Data of ~27,000 people exposed via compromised legacy code repository. 3️⃣ 💻 Cyber Snapshot
@Daily_Fomo_X
22 Dec 2025
69 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Firebox firewalls under attack (CVE-2025-14733) https://t.co/JCTCtkdcIj #HelpNetSecurity #Cybersecurity https://t.co/bmSLQFEH4C
@PoseidonTPA
22 Dec 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard Firebox firewalls under attack (CVE-2025-14733) https://t.co/iRaFlXV5dZ
@TheCyberSecHub
22 Dec 2025
551 Impressions
4 Retweets
8 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard製ファイアウォールに深刻な脆弱性が見つかり、世界で約12万5千台が未対策のまま危険にさらされている(CVE-2025-14733)。IKEv2対応VPNを通じて遠隔から侵入でき、運用中の企業ネットワークに直接影響する
@yousukezan
22 Dec 2025
6089 Impressions
19 Retweets
48 Likes
10 Bookmarks
0 Replies
2 Quotes
🚨ด่วน! แจ้งเตือนกรณีช่องโหว่ในอุปกรณ์ WatchGuard Firebox (CVE-2025-14733) อย่าเปิดโอกาสให้ถูกโจมตีระบบจากระยะไกล ⚠️ ThaiCERT ไ
@ThaiCERTByNCSA
22 Dec 2025
72 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard製Fireboxのikedにおける境界外書き込みの脆弱性(CVE-2025-14733)に関する注意喚起を公開。すでに脆弱性の悪用が確認されています。開発者が提供する最新の情報を元に、対策や緩和策の適用、侵害有無
@jpcert
22 Dec 2025
3487 Impressions
4 Retweets
9 Likes
2 Bookmarks
0 Replies
0 Quotes
統合版 JPCERT/CC | 注意喚起: WatchGuard製Fireboxのikedにおける境界外書き込みの脆弱性(CVE-2025-14733)に関する注意喚起 (公開) https://t.co/Zi10Nw2tQB #itsec_jp
@itsec_jp
22 Dec 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WatchGuard has warned customers to patch a critical, actively exploited remote code execution (RCE) vulnerability in its Firebox firewalls. Tracked as CVE-2025-14733, this security flaw affects firewalls running Fireware OS 11.x and later. https://t.co/0Pdy09xMqZ https://t.co/4Hr
@riskigy
21 Dec 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C506DA98-651D-4EA6-BEAE-4E5E69841E0F",
"versionEndExcluding": "12.5.15",
"versionStartIncluding": "11.10.2"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:firebox_t15:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CC78E84B-C17B-44C5-9427-5EF97B90A6EF"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t35:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "12FED793-9DF3-46BB-AA64-3B1934123616"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9C81D87D-AB69-48F3-B780-1DB762865AB5",
"versionEndExcluding": "12.11.6",
"versionStartIncluding": "11.10.2"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:firebox_m270:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DB00A42A-2065-4914-80CA-981E62DEC2CC"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m290:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "5FC5E2C2-B0E3-4879-9B7C-E6E84A7BEC4E"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m370:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "22AC145E-2F33-4C0D-AA78-080CEA1980AB"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m390:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "80F83640-57E7-4DF8-A201-E8D5722EF978"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m440:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "2F639188-7E3D-46B8-8443-5B1F32A3EC59"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m4600:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BB643AE5-6432-474F-BCF9-7A92B907EDE1"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m470:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "08FC5CE7-00F5-40C4-877F-78D3DF6B01DC"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m4800:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "04B14406-F7EC-4573-8AF0-BCCBA9BD1A15"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m5600:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4D10EFE3-0342-4670-AC73-011D08A4CBEA"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m570:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "68953F7A-9037-4848-9F7B-FD8E798CB761"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m5800:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "1A49CF31-D888-4DAE-B1D4-2E4E5A98B38A"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m590:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9F14FE4A-4C09-4B2E-8D2C-ECA03FC62595"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m670:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "413CB88D-9755-43BF-9D76-4252C7151A84"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m690:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "902C261B-AE76-4F2A-B660-2C069692E95D"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_nv5:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F3781D2E-80EF-4F6C-BBC3-7570940A5EBF"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t20:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "1D5FBFA4-219F-49F8-BD2C-415A621F6ED6"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t25:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "157A59B2-F420-4203-92C4-412685C51893"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t40:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FFD1036B-87F5-4523-B67C-0DE6E9AACE32"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t45:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CA4FE4DD-A364-4D3C-B84A-516AFC05F5A4"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t55:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8050A99B-C106-422D-9497-5E7C79FB89E0"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t70:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7F2A1048-7830-4CEB-B6D1-4A4F0C10580F"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t80:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F97AE5A0-E6E5-46BD-B05D-98E4253773F7"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t85:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "BD55ABF8-7C3C-476C-9A04-C889F3D8A21E"
},
{
"criteria": "cpe:2.3:h:watchguard:fireboxcloud:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9882123D-992F-4BDA-8EE0-433A3AF62B54"
},
{
"criteria": "cpe:2.3:h:watchguard:fireboxv:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4D86B0B2-D05B-4361-A02A-C1FEE2F710DD"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D89FF95E-552C-4264-94F9-F7D50FE002FA",
"versionEndExcluding": "2025.1.4",
"versionStartIncluding": "2025.1"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:firebox_t115-w:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E28F563C-BC6E-41FB-8C62-F56CC539D4DD"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t125:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "2296AE00-4806-484D-BD1D-B58A8FB87CE0"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t125-w:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F9071315-92A1-45FA-A048-BB750A40EF76"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t145:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9A435F5A-752F-44D7-8083-0C2670F26689"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t145-w:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "591A04F9-FF92-4484-91DC-F268805A8708"
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t185:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "49672197-C3FA-42A5-A550-DCA5ED89D0FA"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]