CVE-2025-11838

Dec. 16, 2025, 12:16 a.m.

8.7
High

Description

A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer. This vulnerability affects Fireware OS 12.6.1 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2.

Product(s) Impacted

Vendor Product Versions
Watchguard
  • Fireware
  • Firebox T115-w
  • Firebox T125
  • Firebox T125-w
  • Firebox T145
  • Firebox T145-w
  • Firebox T185
  • Firebox M270
  • Firebox M290
  • Firebox M370
  • Firebox M390
  • Firebox M440
  • Firebox M4600
  • Firebox M470
  • Firebox M4800
  • Firebox M5600
  • Firebox M570
  • Firebox M5800
  • Firebox M590
  • Firebox M670
  • Firebox M690
  • Firebox Nv5
  • Firebox T20
  • Firebox T25
  • Firebox T40
  • Firebox T45
  • Firebox T55
  • Firebox T70
  • Firebox T80
  • Firebox T85
  • Fireboxcloud
  • Fireboxv
  • *
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-763
Release of Invalid Pointer or Reference
The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o watchguard fireware / / / / / / / /
h watchguard firebox_t115-w - / / / / / / /
h watchguard firebox_t125 - / / / / / / /
h watchguard firebox_t125-w - / / / / / / /
h watchguard firebox_t145 - / / / / / / /
h watchguard firebox_t145-w - / / / / / / /
h watchguard firebox_t185 - / / / / / / /
o watchguard fireware / / / / / / / /
h watchguard firebox_m270 - / / / / / / /
h watchguard firebox_m290 - / / / / / / /
h watchguard firebox_m370 - / / / / / / /
h watchguard firebox_m390 - / / / / / / /
h watchguard firebox_m440 - / / / / / / /
h watchguard firebox_m4600 - / / / / / / /
h watchguard firebox_m470 - / / / / / / /
h watchguard firebox_m4800 - / / / / / / /
h watchguard firebox_m5600 - / / / / / / /
h watchguard firebox_m570 - / / / / / / /
h watchguard firebox_m5800 - / / / / / / /
h watchguard firebox_m590 - / / / / / / /
h watchguard firebox_m670 - / / / / / / /
h watchguard firebox_m690 - / / / / / / /
h watchguard firebox_nv5 - / / / / / / /
h watchguard firebox_t20 - / / / / / / /
h watchguard firebox_t25 - / / / / / / /
h watchguard firebox_t40 - / / / / / / /
h watchguard firebox_t45 - / / / / / / /
h watchguard firebox_t55 - / / / / / / /
h watchguard firebox_t70 - / / / / / / /
h watchguard firebox_t80 - / / / / / / /
h watchguard firebox_t85 - / / / / / / /
h watchguard fireboxcloud - / / / / / / /
h watchguard fireboxv - / / / / / / /

CVSS Score

8.7 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Dec. 4, 2025, 10:15 p.m.
Last Modified: Dec. 16, 2025, 12:16 a.m.

Status : Modified

CVE has been amended by a source (CVE Primary CNA or another CNA). Analysis data supplied by the NVD may be no longer be accurate due to these changes.

More info

Source

5d1c2695-1a31-4499-88ae-e847036fd7e3

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.