EXECUTIVE SUMMARY:
A set of high-severity flaws in a widely used firewall operating system has been addressed, resolving weaknesses that could allow attackers to crash VPN services, retrieve sensitive configuration data, and execute arbitrary commands through the management interface. The issues stem from memory corruption in IKEv2 VPN handling, XPath injection in the web interface, and out-of-bounds write conditions within CLI modules, creating risks of service disruption, data exposure, and elevated control if a privileged account is compromised.
The update removes critical weaknesses that exposed VPN stability and management-plane security to significant risk. Applying the latest firmware versions ensures this attack paths are fully mitigated and system functionality remains reliable.
RECOMMENDATION:
We strongly recommend you update Fireware OS to below versions:
REFERENCES:
The following reports contain further technical details: