Vulnerability in WatchGuard Firebox Firewalls Allows Unauthenticated SSH Access via Default Settings

Critical Vulnerability in WatchGuard Firebox Firewalls Grants Unauthenticated SSH Access

A significant security flaw has been identified in WatchGuard Firebox firewalls, potentially allowing attackers to gain full administrative control over affected devices without authentication. This vulnerability, designated as CVE-2025-59396, arises from default configurations that expose SSH access on port 4118, utilizing hardcoded credentials.

Understanding the Vulnerability

WatchGuard Firebox appliances, up until September 10, 2025, were shipped with default SSH credentials (admin:readwrite) accessible via port 4118. This configuration permits any individual with network access to the device to remotely connect and obtain full administrative privileges. Exploiting this vulnerability does not require specialized tools; standard SSH clients like PuTTY can establish a connection.

Potential Risks and Impacts

An unauthenticated remote attacker exploiting this flaw can:

– Access Sensitive Information: Retrieve critical network data, including ARP tables, network configurations, user account details, feature keys, and device location information.

– Modify Security Policies: Alter or disable firewall rules and security policies, effectively neutralizing network protections.

– Facilitate Lateral Movement: Navigate through the internal network, potentially compromising other systems and exfiltrating sensitive data.

– Disrupt Network Services: Interrupt or shut down essential network services and infrastructure safeguarded by the firewall.

Immediate Actions for Administrators

Organizations utilizing WatchGuard Firebox devices should promptly:

1. Change Default SSH Credentials: If the default credentials remain unchanged, update them immediately to unique, strong passwords.

2. Restrict SSH Access: Disable SSH access on port 4118 if unnecessary, or limit access to authorized IP addresses only.

3. Consult WatchGuard Advisories: Review WatchGuard’s security advisories for firmware patches and adhere to their remediation guidelines.

Broader Implications

This vulnerability underscores the persistent threat posed by default credentials in network security appliances. Firewalls are designed to protect critical network infrastructure; leaving them exposed with default passwords undermines their fundamental purpose.

Conclusion

The discovery of CVE-2025-59396 in WatchGuard Firebox firewalls highlights the critical importance of securing default configurations and credentials. Administrators must take immediate action to mitigate this vulnerability, ensuring the integrity and security of their network infrastructures.