Over 71,000 WatchGuard Devices Exposed to Remote Code Execution Vulnerabilities

The cybersecurity community has raised a serious alarm following the recent daily reporting of vulnerable WatchGuard devices impacted by a major security flaw.

According to new data published, security researchers at Shadowserver observed over 71,000 WatchGuard devices part of a global exposure that could allow remote code execution attacks.

This surge in exposure heightens the urgency for organizations to patch and secure their network infrastructure immediately.

Massive Exposure Linked to CVE-2025-9242

The vulnerability in question, tracked as CVE-2025-9242, affects WatchGuard Fireware OS and is related to an Out-of-Bounds Write in the IKEv2 ISAKMP component.

This flaw enables remote attackers to execute arbitrary code on unpatched devices simply by sending specially crafted network packets.

Shadowserver’s extensive internet scanning efforts revealed that these weaknesses are widespread, with over 71,000 exposed WatchGuard Fireware OS devices across multiple sectors and geographies.

The vulnerable surface consists largely of firewall appliances and VPN gateways commonly deployed in organizations to secure remote access.

The scale of the discovery not only underlines the popularity of WatchGuard products but also signals a significant attack surface for cybercriminals to exploit.

CVE DetailsInformation
CVE IDCVE-2025-9242
Affected ProductWatchGuard Fireware OS
Vulnerability TypeOut-of-Bounds Write
Affected ComponentIKEv2 ISAKMP
CVSS 3.1 Score9.8 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ImpactRemote Code Execution (RCE)
Exposed Devices71,000+
Discovery DateOctober 18, 2025
Reported ByShadowserver

Shadowserver began tracking and sharing live daily data on compromised IPs associated with CVE-2025-9242.

Their reporting uses active scanning to identify vulnerable WatchGuard Fireware OS systems visible on the Internet.

Each day, organizations and network administrators receive fresh intelligence on exposed assets, allowing them to take immediate action.

The daily figures serve as both a warning and a call to action. In their recent reporting, over 71,000 vulnerable instances were confirmed on a single day.

The numbers reveal a persistent lack of patching and general delay in remediation by many organizations, despite clear public advisories.

Exposed WatchGuard devices are at heightened risk of remote attacks, including full system compromise, data theft, or disruption of business operations.

Experts strongly urge IT teams to patch all affected systems running WatchGuard Fireware OS and verify that no unauthorized access has already occurred.

This incident highlights the ongoing need for continuous vulnerability management, proactive security monitoring, and the value of shared threat intelligence provided by platforms like Shadowserver.

Quick intervention and ongoing vigilance will be critical to defending enterprise perimeters against attackers exploiting CVE-2025-9242-linked weaknesses.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here