Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.
History

Fri, 14 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 13:30:00 +0000

Type Values Removed Values Added
Description Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.
Title WatchGaurd Firebox Host Header Injection Vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WatchGuard

Published:

Updated: 2025-02-14T14:01:35.532Z

Reserved: 2025-01-02T19:07:31.451Z

Link: CVE-2025-0178

cve-icon Vulnrichment

Updated: 2025-02-14T14:01:29.749Z

cve-icon NVD

Status : Received

Published: 2025-02-14T14:15:32.403

Modified: 2025-02-14T14:15:32.403

Link: CVE-2025-0178

cve-icon Redhat

No data.