
The following vulnerabilities were recently added to the CISA Known Exploited Vulnerabilities (KEV) catalog and involve WatchGuard Firebox, Microsoft Windows, and Gladinet Triofox products:
WatchGuard Firebox
CVE-2025-9242: Out-of-Bounds Write Vulnerability
This vulnerability exists in the WatchGuard Firebox OS, specifically in the iked (Internet Key Exchange daemon) process. It allows a remote unauthenticated attacker to perform an out-of-bounds write, potentially enabling arbitrary code execution on the device. This critical flaw presents a significant risk for remote exploitation and compromise of network security appliances running Firebox OS. Immediate patching and protective network configurations are strongly recommended.
Microsoft Windows
CVE-2025-62215: Race Condition Vulnerability
A race condition flaw in the Microsoft Windows kernel allows a local attacker with low-level privileges to escalate to SYSTEM-level access. This escalation can give attackers complete control over the system, potentially undermining the security posture of affected Windows devices. Applying the latest kernel patches is essential to mitigate this issue and prevent privilege escalation attacks.
Gladinet Triofox
CVE-2025-12480: Improper Access Control Vulnerability
The Gladinet Triofox platform suffers from an improper access control vulnerability where initial setup pages remain accessible even after setup is complete. This flaw allows unauthorized users to access sensitive setup functions that should be locked down, possibly leading to unauthorized system changes or security misconfigurations. Updating to the patched version is necessary to close this security gap.
These vulnerabilities were officially added to the KEV catalog to highlight their active exploitation and critical risk level. Organizations using these products should urgently verify patching status and apply recommended mitigations to reduce exploitation risks.


