{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0178","assignerOrgId":"5d1c2695-1a31-4499-88ae-e847036fd7e3","state":"PUBLISHED","assignerShortName":"WatchGuard","dateReserved":"2025-01-02T19:07:31.451Z","datePublished":"2025-02-14T13:22:22.237Z","dateUpdated":"2025-02-14T14:01:35.532Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Fireware OS","vendor":"WatchGuard","versions":[{"lessThanOrEqual":"12.5.12+701324","status":"affected","version":"12.0","versionType":"semver"},{"lessThanOrEqual":"12.11","status":"affected","version":"12.6.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.<br><p>This issue affects Fireware OS: from 12.0 up to and including 12.11.</p>"}],"value":"Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\nThis issue affects Fireware OS: from 12.0 up to and including 12.11."}],"impacts":[{"capecId":"CAPEC-141","descriptions":[{"lang":"en","value":"CAPEC-141 Cache Poisoning"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.1,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"5d1c2695-1a31-4499-88ae-e847036fd7e3","shortName":"WatchGuard","dateUpdated":"2025-02-14T13:22:22.237Z"},"references":[{"url":"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003"}],"source":{"advisory":"WGSA-2025-00003","discovery":"EXTERNAL"},"title":"WatchGaurd Firebox Host Header Injection Vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-14T14:01:22.671243Z","id":"CVE-2025-0178","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-14T14:01:35.532Z"}}]}}