Open Nav
Sign Up

WatchGuard Firebox RCE Actively Exploited in the Wild: CVE-2025-14733

CVE-2025-14733

Filip Dimitrov

December 21, 2025

WatchGuard has disclosed a critical remote code execution (RCE) vulnerability affecting Firebox firewall appliances running the Fireware operating system. The vulnerability, tracked as CVE-2025-14733, is being actively exploited in the wild shortly after public disclosure.

According to WatchGuard and multiple security researchers, threat actors are targeting internet-facing Firebox devices to achieve unauthenticated remote command execution, potentially leading to full firewall compromise and downstream network access.

Impact

If successfully exploited, CVE-2025-14733 allows an unauthenticated attacker to execute arbitrary commands on the affected firewall appliance. Given the role of Firebox devices as network perimeter controls, exploitation presents a high-impact risk scenario.

A compromised firewall may allow attackers to tamper with security policies, deploy additional malicious tooling, establish persistence, or use the device as a pivot point for lateral movement into internal networks.

Affected Technologies

This vulnerability impacts WatchGuard Firebox appliances running vulnerable versions of the Fireware operating system. Devices exposed to the internet are considered at highest risk.

Affected versions include:

  • Fireware OS versions 11.10.2 up to and including 11.12.4_Update1
  • Fireware OS versions 12.0 up to and including 12.11.5
  • Fireware OS versions 2025.1 up to and including 2025.1.3

WatchGuard has released patched versions to address the issue.

Mitigation Guidance

Organizations using WatchGuard Firebox appliances should apply vendor-provided security updates immediately. Management interfaces should be restricted to trusted IP ranges, and firewall logs should be reviewed for signs of unauthorized access or abnormal activity.

If compromise is suspected, affected devices should be isolated, credentials rotated, and incident response procedures initiated without delay.


Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.