Critical Out-of-Bounds Write Vulnerability in WatchGuard Firebox Firewalls Exploited in the Wild
Summary
Hide ▲
Show ▼
Over 75,000 WatchGuard Firebox network security appliances are exposed on the public web and vulnerable to a critical remote code execution flaw (CVE-2025-9242) that allows remote attackers to execute code without authentication. This vulnerability affects devices running Fireware OS 11.x, 12.x, and 2025.1, particularly those configured to use IKEv2 VPN. Devices may remain vulnerable even if the IKEv2 VPN configurations have been deleted. WatchGuard has released patches and provided a temporary workaround for administrators who cannot immediately update their devices. The vulnerability is actively being exploited in the wild, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog on November 13, 2025, based on evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are advised to apply WatchGuard's patches by December 3, 2025. The Shadowserver Foundation detected over 71,000 vulnerable devices as of October 17, 2025. As of November 12, 2025, over 54,300 Firebox instances remain vulnerable, with the U.S. having the highest number of vulnerable devices at 18,500.
Timeline
-
13.11.2025 09:23 2 articles · 1d ago
CISA adds CVE-2025-9242 to KEV catalog due to active exploitation
CISA has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog and has given Federal Civilian Executive Branch (FCEB) agencies three weeks, until December 3, to secure their systems against ongoing attacks as mandated by the Binding Operational Directive (BOD) 22-01. WatchGuard released security patches to address the vulnerability on September 17, but only tagged it as exploited in attacks almost one month later, on October 21. The number of vulnerable Firebox appliances worldwide has fallen to just over 54,000, according to Shadowserver's latest statistics, most of them located in Europe and North America.
Show sources
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
18.09.2025 11:23 5 articles · 1mo ago
WatchGuard releases patches for critical out-of-bounds write vulnerability in Firebox firewalls
The vulnerability affects mobile user VPN with IKEv2 and the branch office VPN (BOVPN) using IKEv2 when configured with a dynamic gateway peer. The Shadowserver Foundation detected over 71,000 vulnerable devices as of October 17, 2025. As of November 12, 2025, over 54,300 Firebox instances remain vulnerable, with the U.S. having the highest number of vulnerable devices at 18,500.
Show sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
Information Snippets
-
The vulnerability, CVE-2025-9242, is an out-of-bounds write flaw that allows remote code execution.
First reported: 18.09.2025 11:233 sources, 6 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
Affected Firebox firewalls are running Fireware OS 11.x, 12.x, and 2025.1.
First reported: 18.09.2025 11:233 sources, 6 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The vulnerability is present in devices configured to use IKEv2 VPN.
First reported: 18.09.2025 11:233 sources, 6 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
Devices may remain vulnerable even if the IKEv2 VPN configurations have been deleted.
First reported: 18.09.2025 11:233 sources, 4 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
-
Patches are available in versions 12.3.1_Update3 (B722811), 12.5.13, 12.11.4, and 2025.1.1.
First reported: 18.09.2025 11:232 sources, 4 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
A temporary workaround involves disabling dynamic peer BOVPNs and configuring new firewall policies.
First reported: 18.09.2025 11:231 source, 3 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The vulnerability is not yet being exploited in the wild.
First reported: 18.09.2025 11:232 sources, 3 articlesShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
-
WatchGuard collaborates with over 17,000 security resellers and service providers to protect more than 250,000 small and mid-sized companies worldwide.
First reported: 18.09.2025 11:231 source, 1 articleShow sources
- WatchGuard warns of critical vulnerability in Firebox firewalls — www.bleepingcomputer.com — 18.09.2025 11:23
-
The vulnerability is tracked as CVE-2025-9242 with a CVSS score of 9.3.
First reported: 17.10.2025 12:252 sources, 2 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
-
The vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3, and 2025.1.
First reported: 17.10.2025 12:253 sources, 3 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
-
The flaw is present in the function 'ike2_ProcessPayload_CERT' in the file 'src/ike/iked/v2/ike2_payload_cert.c'.
First reported: 17.10.2025 12:252 sources, 2 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
-
The issue arises due to a missing length check on the identification buffer, allowing an attacker to trigger an overflow during the IKE_SA_AUTH phase.
First reported: 17.10.2025 12:252 sources, 3 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
-
The vulnerability can be exploited to gain control of the instruction pointer register and spawn a Python interactive shell over TCP.
First reported: 17.10.2025 12:251 source, 2 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
-
WatchTowr Labs described the vulnerability as having characteristics that ransomware gangs would exploit, including affecting an internet-exposed service and being exploitable without authentication.
First reported: 17.10.2025 12:252 sources, 3 articlesShow sources
- Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices — thehackernews.com — 17.10.2025 12:25
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
-
Over 75,000 WatchGuard Firebox devices are exposed on the public web and vulnerable to CVE-2025-9242.
First reported: 20.10.2025 20:422 sources, 3 articlesShow sources
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The United States has the highest number of vulnerable devices, with 24,500 endpoints.
First reported: 20.10.2025 20:421 source, 2 articlesShow sources
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
Germany, Italy, the United Kingdom, Canada, and France also have significant numbers of vulnerable devices.
First reported: 20.10.2025 20:421 source, 2 articlesShow sources
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The Shadowserver Foundation detected 75,955 vulnerable Firebox firewalls on October 19, 2025.
First reported: 20.10.2025 20:422 sources, 3 articlesShow sources
- Over 75,000 WatchGuard security devices vulnerable to critical RCE — www.bleepingcomputer.com — 20.10.2025 20:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The vulnerability is tracked as CVE-2025-9242 with a CVSS4.0 score of 9.3.
First reported: 21.10.2025 13:421 source, 1 articleShow sources
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
-
The vulnerability affects mobile user VPN with IKEv2 and the branch office VPN (BOVPN) using IKEv2 when configured with a dynamic gateway peer.
First reported: 21.10.2025 13:422 sources, 2 articlesShow sources
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
-
The Shadowserver Foundation detected over 71,000 vulnerable devices as of October 17, 2025.
First reported: 21.10.2025 13:422 sources, 2 articlesShow sources
- Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution — www.infosecurity-magazine.com — 21.10.2025 13:42
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
CISA added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog on November 13, 2025, based on evidence of active exploitation.
First reported: 13.11.2025 09:232 sources, 2 articlesShow sources
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
As of November 12, 2025, over 54,300 Firebox instances remain vulnerable to the critical bug, down from a high of 75,955 on October 19, 2025.
First reported: 13.11.2025 09:232 sources, 2 articlesShow sources
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
Roughly 18,500 of these vulnerable devices are in the U.S., with Italy (5,400), the U.K. (4,000), Germany (3,600), and Canada (3,000) rounding up the top five.
First reported: 13.11.2025 09:232 sources, 2 articlesShow sources
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
Federal Civilian Executive Branch (FCEB) agencies are advised to apply WatchGuard's patches by December 3, 2025.
First reported: 13.11.2025 09:232 sources, 2 articlesShow sources
- CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks — thehackernews.com — 13.11.2025 09:23
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
CISA has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog and has given Federal Civilian Executive Branch (FCEB) agencies three weeks, until December 3, to secure their systems against ongoing attacks as mandated by the Binding Operational Directive (BOD) 22-01.
First reported: 13.11.2025 12:031 source, 1 articleShow sources
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
WatchGuard released security patches to address the vulnerability on September 17, but only tagged it as exploited in attacks almost one month later, on October 21.
First reported: 13.11.2025 12:031 source, 1 articleShow sources
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The number of vulnerable Firebox appliances worldwide has fallen to just over 54,000, according to Shadowserver's latest statistics, most of them located in Europe and North America.
First reported: 13.11.2025 12:031 source, 1 articleShow sources
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
The Akira ransomware gang has been actively exploiting CVE-2024-40766, a year-old critical-severity vulnerability, to hack into SonicWall firewalls since September 2024.
First reported: 13.11.2025 12:031 source, 1 articleShow sources
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
-
In April 2022, CISA also ordered federal civilian agencies to patch an actively exploited bug impacting WatchGuard Firebox and XTM firewall appliances.
First reported: 13.11.2025 12:031 source, 1 articleShow sources
- CISA warns of WatchGuard firewall flaw exploited in attacks — www.bleepingcomputer.com — 13.11.2025 12:03
Similar Happenings
Active Exploitation of Critical Microsoft WSUS Flaw
A critical vulnerability in Microsoft Windows Server Update Service (WSUS), CVE-2025-59287, is being actively exploited in the wild. This flaw, with a CVSS score of 9.8, allows attackers to drop malicious payloads and execute arbitrary commands on infected hosts. The vulnerability affects WSUS versions 3.32.x and was discovered by Eye Security and Huntress. The Cybersecurity and Infrastructure Security Agency (CISA) has ordered U.S. government agencies to patch the flaw, which was added to the Known Exploited Vulnerabilities catalog. Organizations using WSUS are advised to apply the out-of-band security updates provided by Microsoft to mitigate the risk of exploitation. The flaw was originally patched by Microsoft as part of its Patch Tuesday updates, but attackers have since weaponized it to deploy .NET executables and Base64-encoded PowerShell scripts. Shadowserver is tracking over 2,800 WSUS instances with default ports exposed online. The vulnerability is a deserialization of untrusted data flaw that allows unauthenticated attackers to achieve remote code execution with system privileges by sending malicious encrypted cookies to the GetCookie() endpoint. A compromised WSUS server could potentially be used to distribute malicious updates to the entire network of client computers, making it particularly dangerous for large enterprises. Huntress advised isolating network access to WSUS and blocking inbound traffic to TCP ports 8530 and 8531 as remediation steps. The out-of-band (OOB) security update KB5070881 for CVE-2025-59287 broke hotpatching on some Windows Server 2025 devices. Microsoft has released a new update, KB5070893, to address the issue without disrupting hotpatching. Administrators are advised to install this update to maintain hotpatching functionality.
Critical WSUS RCE Vulnerability Exploited in the Wild
A critical remote code execution (RCE) vulnerability (CVE-2025-59287) in Windows Server Update Service (WSUS) is being actively exploited in the wild. The flaw allows attackers to run malicious code with SYSTEM privileges on Windows servers with the WSUS Server role enabled. Microsoft has released out-of-band patches for all affected Windows Server versions. Cybersecurity firms have observed exploitation attempts and the presence of publicly available proof-of-concept exploit code. The vulnerability is considered potentially wormable between WSUS servers and poses a significant risk to organizations. The flaw concerns a case of deserialization of untrusted data in WSUS. The vulnerability was discovered and reported by security researchers MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange with CODE WHITE GmbH. CISA and NSA, along with international partners, have issued guidance to secure Microsoft Exchange Server instances, including recommendations to restrict administrative access, implement multi-factor authentication, and enforce strict transport security configurations. The agencies advise decommissioning end-of-life on-premises or hybrid Exchange servers after transitioning to Microsoft 365. Sophos reported threat actors exploiting the vulnerability to harvest sensitive data from U.S. organizations across various industries, with at least 50 victims identified. The exploitation activity was first detected on October 24, 2025, a day after Microsoft issued the update. Attackers use Base64-encoded PowerShell commands to exfiltrate data to a webhook[.]site endpoint. Michael Haag of Splunk noted an alternate attack chain involving the Microsoft Management Console binary (mmc.exe) to trigger cmd.exe execution.
Active Exploitation of Critical Adobe AEM Forms Misconfiguration
A critical misconfiguration flaw in Adobe Experience Manager (AEM) Forms on JEE versions 6.5.23.0 and earlier is under active exploitation. The flaw, CVE-2025-54253, allows arbitrary code execution via an exposed servlet. Adobe released a patch in August 2025. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies must apply the necessary fixes by November 5, 2025. The flaw was discovered by Adam Kues and Shubham Shah of Searchlight Cyber, who disclosed it to Adobe on April 28, 2025. The flaw is caused by an exposed /adminui/debug servlet that evaluates user-supplied OGNL expressions as Java code without authentication or input validation. This enables attackers to execute arbitrary system commands with a single crafted HTTP request. A proof-of-concept exploit is publicly available.
Arbitrary File Read Vulnerability in Slider Revolution Plugin
A vulnerability in the Slider Revolution plugin for WordPress, tracked as CVE-2025-9217, allows authenticated users with contributor-level permissions or higher to read sensitive files on the server. The flaw affects all versions up to 6.7.36 and stems from insufficient validation in the 'used_svg' and 'used_images' parameters. The issue was discovered by an independent researcher and disclosed through the Wordfence Bug Bounty Program. The developer, ThemePunch, released a patch on August 28, 2025. The vulnerability could expose confidential server data, including database credentials and cryptographic keys. Slider Revolution is widely used, with over 4 million active installations. Security experts recommend updating to the latest version to mitigate the risk.
Active Exploitation of Multiple Critical Vulnerabilities in Gladinet and TrioFox
Active exploitation of critical vulnerabilities in Gladinet's CentreStack and TrioFox products continues. The zero-day vulnerability, CVE-2025-11371, is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. This flaw affects all versions prior to and including 16.7.10368.56560. The vulnerability has been exploited to retrieve the machine key from the application Web.config file, enabling remote code execution via a ViewState deserialization vulnerability. Three customers have been impacted so far. A patch for the zero-day vulnerability CVE-2025-11371 is now available in CentreStack version 16.10.10408.56683. Users are advised to upgrade to this version or, if upgrading is not possible, disable the "temp" handler within the Web.config file for UploadDownloadProxy to mitigate the risk. The vendor, Gladinet, has been notified and is working on a fix. The vulnerability was detected by researchers at Huntress on September 27, 2025. The flaw was exploited to obtain a machine key and execute code remotely. The attack used an older deserialization vulnerability (CVE-2025-30406) to achieve remote code execution (RCE) through ViewState. The mitigations will impact some functionality of the platform but prevent exploitation of CVE-2025-11371. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-11371 to its Known Exploited Vulnerabilities (KEV) catalog on November 5, 2025, citing evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by November 25, 2025, to secure their networks. Additionally, a new critical vulnerability, CVE-2025-12480 (CVSS score: 9.8), has been discovered in Gladinet's Triofox file-sharing and remote access platform. This flaw allows attackers to bypass authentication and access configuration pages, resulting in the upload and execution of arbitrary payloads. The threat cluster tracked as UNC6485 has been exploiting this flaw since August 24, 2025. The attackers have used the built-in antivirus feature to execute malicious files and set up encrypted tunnels to command-and-control servers, leveraging remote access tools like Zoho Assist and AnyDesk for further exploitation. The vulnerability CVE-2025-12480 was discovered and reported by Mandiant on November 10. The flaw allows an attacker to gain access to initial setup pages even after setup is complete, enabling the upload and execution of arbitrary payloads. The exploitation campaign started on August 14, 2025. The attackers exploited an HTTP Host header vulnerability by spoofing localhost in requests, bypassing access controls to reach the normally restricted AdminDatabase.aspx setup page. The flaw stemmed from missing origin validation and over-reliance on the host header, allowing unauthenticated remote access to critical configuration pages. The attackers logged in using the newly created Admin account and uploaded malicious files to execute them using the built-in anti-virus feature.