fkie_cve-2025-11838
Vulnerability from fkie_nvd
Published
2025-12-04 22:15
Modified
2025-12-10 15:40
Severity ?
Summary
A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.
This vulnerability affects Fireware OS 12.0 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46DAB795-8DD0-4D6C-99D5-B9057E76DB87",
"versionEndExcluding": "2025.1.3",
"versionStartIncluding": "2025.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:firebox_t115-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8AAE66B-DD19-4C90-8DFC-F77BA1541642",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC18430-C6B4-4395-BFF1-83BB005875BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t125-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7C1C91-8B6E-4FB0-841E-7F88B06B1435",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE309D6-BD5E-4D18-91C3-A492C3576115",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t145-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75959D39-0960-4836-96C7-DB8048DDE4B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t185:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0087049-27C6-4B18-A645-72A8F63D7C6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A7E5749-EB5F-41C5-8CD9-1C4A0FF6E738",
"versionEndExcluding": "12.11.5",
"versionStartIncluding": "12.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:watchguard:firebox_m270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E472917E-D6E1-4C2D-B37D-E76FCC7307CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8C7779-4466-4A9E-B191-929E7746DFF7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE9A123-B769-4E56-845E-DC3DA6166C78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180FAE8C-2E73-4C09-AA11-0C82A7715FA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "309DBEF2-1D92-4641-827F-D99758B5FFA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E8CFC5-51FE-4D75-845F-D70C30AF11B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFBA966-E052-4350-9544-3B5D484DBB6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m4800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1E586D-0E88-447A-95E8-5203EF869ADB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC087C4-CB10-46D4-A746-0C462354410C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59389EA2-3067-4AF8-AEC5-FE79E269C170",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445FA7CD-D0AE-4176-9AE5-293B918DE654",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4A7366-0304-431E-B3E4-719BA575CEAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8512B4A-5269-4067-B9C6-475A4E8AD313",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_m690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179C6166-87E1-44F8-B727-CDDE40C673D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_nv5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "584107CC-6136-4AA1-AE68-73B93BDDB5B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9295217E-C1A0-4A69-A0F0-C44814BB376C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC49246-2166-4681-8D67-4C0940884872",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC853916-8BDC-4F7C-BA53-D6AB490A9444",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t45:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB1A254-DA3C-4032-B2C6-C9EBCE8EC15E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3562304-0317-4A3C-B622-D5CE01CC97F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "327BA50A-366A-4367-93B8-328EC0136FA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D92ABD52-20F6-4AB1-801F-9E7B7B1B78A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:firebox_t85:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3552F3BB-8021-4E87-987D-870699A7E619",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:fireboxcloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158560A0-D694-41AF-A5F8-0F6FB3EFB8FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:watchguard:fireboxv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECAE1D7-9868-4730-B645-44CB1B6FDE96",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.\n\nThis vulnerability affects Fireware OS 12.0 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2."
}
],
"id": "CVE-2025-11838",
"lastModified": "2025-12-10T15:40:02.507",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary"
}
]
},
"published": "2025-12-04T22:15:46.610",
"references": [
{
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"tags": [
"Vendor Advisory"
],
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00018"
}
],
"sourceIdentifier": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-763"
}
],
"source": "5d1c2695-1a31-4499-88ae-e847036fd7e3",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…