CVE-2025-59396 ? WatchGuard Firebox Default Configuration Allows Unauthorized SSH Access CVE-2025-59396 ? WatchGuard Firebox Default Configuration Allows Unauthorized SSH Access via Port 4118
Description
The default configuration of WatchGuard Firebox devices through 2025-09-10 allows administrative access via SSH on port 4118 using the default credentials (admin:readwrite). This configuration exposes the device to remote attackers who can gain full administrative access without prior authentication.
Impact
An unauthenticated attacker can:
Retrieve sensitive information such as ARP tables, network configurations, user accounts, feature keys, and device location data.
Modify or disable firewall rules and security policies.
Perform lateral movement within the internal network.
Exfiltrate data or disrupt services.
This results in a complete compromise of the Firebox appliance and the network it protects.
Vulnerability Type
Misconfiguration / Insecure Defaults
Authentication Bypass via Default Credentials
Attack Vector
Remote access via SSH on port 4118 using:
Username: admin
Password: readwrite
Tools like PuTTY or any SSH client can be used to exploit this vulnerability.
Affected Product
Vendor: WatchGuard
Product: Firebox series (specific models and firmware versions TBD)
Component: SSH Service (Port 4118)
Status: Exposed by default
Discoverers
Chanakya Neelarapu
Mark Gibson
CVE ID
CVE-2025-59396
Impacts
? Remote Code Execution
? Privilege Escalation
? Information Disclosure
? Network Exposure and Lateral Movement
Reference
https://www.watchguard.com/wgrd-products/firewalls