{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11838","assignerOrgId":"5d1c2695-1a31-4499-88ae-e847036fd7e3","state":"PUBLISHED","assignerShortName":"WatchGuard","dateReserved":"2025-10-16T06:58:57.085Z","datePublished":"2025-12-04T21:48:10.961Z","dateUpdated":"2025-12-15T23:18:30.406Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Fireware OS","vendor":"WatchGuard","versions":[{"lessThanOrEqual":"12.11.4","status":"affected","version":"12.6.1","versionType":"semver"},{"lessThanOrEqual":"2025.1.2","status":"affected","version":"2025.1","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:12.6.1","versionEndIncluding":"12.11.4","versionStartIncluding":"12.6.1","vulnerable":true},{"criteria":"cpe:2.3:a:watchguard:fireware_os:*:*:*:*:*:*:*:2025.1","versionEndIncluding":"2025.1.2","versionStartIncluding":"2025.1","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"McCaulay Hudson (@_McCaulay) of watchTowr"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.<br><br>This vulnerability affects Fireware OS 12.6.1 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2."}],"value":"A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.\n\nThis vulnerability affects Fireware OS 12.6.1 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2."}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-763","description":"CWE-763 Release of Invalid Pointer or Reference","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"5d1c2695-1a31-4499-88ae-e847036fd7e3","shortName":"WatchGuard","dateUpdated":"2025-12-15T23:18:30.406Z"},"references":[{"url":"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00018"}],"source":{"advisory":"WGSA-2025-00018","defect":["FBX-30631"],"discovery":"EXTERNAL"},"title":"WatchGuard Firebox iked Memory Corruption Vulnerability","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T15:44:19.445395Z","id":"CVE-2025-11838","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T15:44:31.064Z"}}]}}