The Encryption Crisis Nobody's Talking About Why Texas Businesses Must Act on Quantum Threats Today

WatchGuard Vulnerabilities (2023–2025): What Got Hit, What Versions Were Vulnerable, and What to Patch Now

Table of Contents

WatchGuard Vulnerabilities (2023–2025): What Got Hit, What Versions Were Vulnerable, and What to Patch Now

If you run WatchGuard, you run security infrastructure.
That also means attackers will target it first.

Firewalls, VPNs, SSO agents, endpoint agents, and password manager extensions sit close to identity and network trust. One missed patch can turn “secure edge” into “open door.”

This post highlights major WatchGuard vulnerabilities from the last two years (December 2023 through today, December 20, 2025) and gives you a clean timeline of vulnerable versions and fixed versions. It also explains what to do next, so you can reduce risk fast.


Why WatchGuard vulnerabilities matter more than “normal” software bugs

Attackers love edge and identity products for three reasons:

  1. They face the internet.
    Firewalls and VPN gateways often accept inbound traffic by design.
  2. They concentrate trust.
    They authenticate users, route traffic, and enforce policies.
  3. They enable lateral movement.
    Once a threat actor lands on an edge device, they can pivot inside.

That is why vulnerabilities in WatchGuard Firebox (Fireware OS), VPN modules, and SSO components matter. One flaw can lead to remote code execution (RCE), credential exposure, service disruption, or silent access.

You will see that pattern clearly in the 2025 VPN/IKEv2 advisories. WatchGuard explicitly notes exploitation activity for the iked out-of-bounds write bugs. WatchGuard+1


The high-risk cluster: Fireware OS, IKEv2, and iked

WatchGuard’s Fireware OS issues in 2025 deserve special attention because they hit the VPN negotiation path.

CVE-2025-9242 (WGSA-2025-00015) — Critical, remote unauthenticated RCE risk

  • WatchGuard describes an out-of-bounds write in the iked process. WatchGuard
  • It impacts Mobile User VPN with IKEv2 and BOVPN using IKEv2 with a dynamic gateway peer. WatchGuard
  • WatchGuard later added indicators of attack and stated evidence suggested active exploitation. WatchGuard
  • Affected versions include Fireware OS 12.0 through 12.11.3 and 2025.1, plus older 11.x ranges. WatchGuard
  • Fixes include 12.11.4 and 2025.1.1 (plus other branch fixes). WatchGuard

CVE-2025-14733 (WGSA-2025-00027) — Critical, remote unauthenticated RCE risk

This is another iked out-of-bounds write advisory, with WatchGuard reporting threat actors attempting exploitation in the wild. WatchGuard

It expands the affected window:

  • Fireware OS 12.0 through 12.11.5 and 2025.1 through 2025.1.3. WatchGuard
  • Fixes: 12.11.6 and 2025.1.4 (plus branch-specific fixes). WatchGuard

Takeaway:
If you use IKEv2 and have any dynamic gateway peer history, patching is not optional. Treat these like emergency updates.


The “quiet but deadly” cluster: SSO agent and client vulnerabilities

SSO components often live inside your network. That makes people dismiss them.
Don’t.

Once an attacker gets any foothold, SSO misconfigurations and protocol flaws can amplify damage. WatchGuard’s 2024 advisories in this area include critical authorization issues.

  • CVE-2024-6592 (WGSA-2024-00014): Protocol authorization bypass between Authentication Gateway (SSO Agent) and SSO Client could allow forged communications and manipulation of account/group data. WatchGuard
  • CVE-2024-6593 (WGSA-2024-00015): Telnet authentication bypass / incorrect authorization in SSO Agent could allow restricted management commands. WatchGuard
  • CVE-2024-6594 (WGSA-2024-00016): DoS against Windows SSO Client via malformed commands. WatchGuard

These are not “internet RCE” bugs.
They are still dangerous in real environments.

Why?

  • Many orgs allow broad east-west traffic.
  • Attackers often gain internal access via phishing.
  • Then they look for identity shortcuts.

Endpoint and client-side issues still matter (even if they are “local”)

Local privilege escalation (LPE) and kernel driver issues often require a foothold.
Attackers almost always get a foothold first.

WatchGuard endpoint advisories in 2024 included driver vulnerabilities (pskmad_64.sys) affecting EPDR and Panda-branded products:

  • CVE-2023-6330 (WGSA-2024-00001): kernel pool memory corruption (DoS and possible SYSTEM-level code execution). Affected versions include EPDR/AD360 ≤ 8.00.22.0022; fixed in 8.00.22.0023. WatchGuard
  • CVE-2023-6331 (WGSA-2024-00002): out-of-bounds write with similar affected/fixed versions. WatchGuard
  • CVE-2023-6332 (WGSA-2024-00003): arbitrary kernel memory read; same affected/fixed versions listed. WatchGuard

Also:

  • CVE-2024-8424 (WGSA-2024-00017): PSANHost.exe issue enabling arbitrary file delete as SYSTEM on Windows for EPDR/AD360/Dome below specified versions. WatchGuard

These bugs matter for:

  • Ransomware staging
  • Persistence
  • EDR tampering

The “you forgot this was security software” cluster: Password manager extension

A password manager extension sits inches from credentials.

WatchGuard disclosed:

  • CVE-2024-1417 (WGSA-2024-00006): local code injection in the AuthPoint Password Manager Safari extension for macOS versions before 1.0.6, fixed in 1.0.6. WatchGuard

Even though it is “local,” it still matters.
In real incidents, attackers chain local execution with credential theft.


Timeline: WatchGuard vulnerabilities and vulnerable versions (Dec 2023 → Dec 20, 2025)

Below is a practical patch-focused timeline. It prioritizes high/critical issues and widely deployed components.

Scope note: WatchGuard publishes many advisories. This timeline focuses on the issues most likely to impact real-world environments (Firebox/Fireware OS, VPN, SSO, endpoint agents, and AuthPoint Password Manager). For full coverage, always cross-check WatchGuard’s PSIRT advisory list.

Date (Published)Advisory / CVEProductImpactVersions VulnerableFixed / Resolved Versions
2024-01-18WGSA-2024-00001 / CVE-2023-6330Endpoint (EPDR, Panda AD360, Panda Dome)MediumEPDR/AD360 ≤ 8.00.22.0022; Dome ≤ 22.02.00EPDR/AD360 8.00.22.0023; Dome 22.02.01
2024-01-18WGSA-2024-00002 / CVE-2023-6331EndpointHighEPDR/AD360 ≤ 8.00.22.0022; Dome ≤ 22.02.00EPDR/AD360 8.00.22.0023; Dome 22.02.01
2024-01-18WGSA-2024-00003 / CVE-2023-6332EndpointMediumEPDR/AD360 ≤ 8.00.22.0022; Dome ≤ 22.02.00EPDR/AD360 8.00.22.0023; Dome 22.02.01
2024-03-26WGSA-2024-00006 / CVE-2024-1417AuthPoint Password Manager (Safari macOS)HighExtension < 1.0.61.0.6
2024-06-27WGSA-2024-00011 / CVE-2024-5974Firebox (Fireware OS)HighFireware 11.9.4 → 12.5.12_Update1; 12.6 → 12.10.312.10.4; 12.5.12 Update 2
2024-09-25WGSA-2024-00014 / CVE-2024-6592SSO (Auth Gateway + clients)CriticalAuth Gateway through 12.10.2; Windows client through 12.7; macOS client through 12.5.4WatchGuard lists mitigations/workarounds (port restrictions).
2024-09-25WGSA-2024-00015 / CVE-2024-6593SSO (Auth Gateway)CriticalAuth Gateway through 12.10.2WatchGuard lists mitigations/workarounds (port restrictions).
2024-09-25WGSA-2024-00016 / CVE-2024-6594SSO (Windows client)HighWindows SSO Client through 12.7WatchGuard lists mitigations/workarounds (port restrictions).
2024-11-07WGSA-2024-00017 / CVE-2024-8424Endpoint (EPDR/AD360/Dome)HighEPDR/AD360 < 8.00.23.0000; Dome < 22.03.00EPDR/AD360 8.00.23.0000; Dome 22.03.00
2025-09-17 (updated later)WGSA-2025-00015 / CVE-2025-9242Firebox (Fireware OS / iked)CriticalFireware 12.0 → 12.11.3, 2025.1, plus specified 11.x ranges12.11.4, 2025.1.1, plus branch-specific fixes
2025-10-29WGSA-2025-00016 / CVE-2025-1549Mobile VPN with SSL (Windows client)MediumClient ≤ 12.10.5Partially mitigated in 12.11.3, but advisory notes residual risk
2025-12-04WGSA-2025-00018 / CVE-2025-11838Firebox (Fireware OS / iked)HighFireware 12.0 → 12.11.4; 2025.1 → 2025.1.212.11.5; 2025.1.3
2025-12-04 (updated 2025-12-19)WGSA-2025-00020 / CVE-2025-12196Firebox (Fireware OS CLI)HighFireware 12.0 → 12.11.4; 12.5 → 12.5.13; 2025.1 → 2025.1.212.11.5; 12.5.14; 2025.1.3
2025-12-18 (updated 2025-12-19)WGSA-2025-00027 / CVE-2025-14733Firebox (Fireware OS / iked)CriticalFireware 12.0 → 12.11.5; 2025.1 → 2025.1.3, plus specified 11.x ranges12.11.6; 12.5.15; 2025.1.4; FIPS branch updates listed

What to do next (practical remediation checklist)

1) Inventory WatchGuard assets like an attacker would

Start with exposure and trust:

  • Firebox appliances with VPN enabled
  • IKEv2 configurations (dynamic gateway peer history matters)
  • SSO Authentication Gateway / SSO clients
  • Endpoint agents (EPDR / AD360 / Dome)
  • AuthPoint Password Manager extension usage

You want a list of:

  • Product
  • Current version
  • Internet exposure
  • Owner and patch window

2) Patch Firebox first, especially IKEv2/iked issues

If you run any affected Fireware versions in the 12.x or 2025.1 branches, patch to the resolved versions shown in the timeline.

Also:

  • Review logs and indicators of attack for iked behavior.
  • Rotate secrets if you confirmed suspicious activity, per WatchGuard guidance.

3) Reduce blast radius with segmentation and firewall rules

This matters most for SSO.

The SSO advisories repeatedly recommend restricting access to specific TCP ports between:

  • Firebox ↔ Authentication Gateway
  • Authentication Gateway ↔ SSO Client

Even if you patch later, restrict those ports now.
This blocks easy abuse inside flat networks.

4) Treat endpoint agent updates as security updates

Endpoint driver flaws and SYSTEM-level delete issues help attackers:

  • Disable defenses
  • Wipe artifacts
  • Escalate privileges

Update EPDR/AD360/Dome to the resolved versions listed.

5) Audit browser extension deployment

If you use AuthPoint Password Manager, ensure Safari extension 1.0.6+. WatchGuard

Also check:

  • Who can install extensions
  • Whether you enforce managed browser policies
  • Whether endpoints allow local admin

Need Help with IT?

At LayerLogix, we pride ourselves on offering pain-free IT Support and Services. From Networking to Cyber Security, we have solutions to support your business. 

Let us manage and maintain your IT, so you can focus on your core business. For a consultation, call us today at (713) 571-2390.