Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.
This issue affects Fireware OS: from 12.0 up to and including 12.11.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Feb 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11. | |
Title | WatchGaurd Firebox Host Header Injection Vulnerability | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: WatchGuard
Published:
Updated: 2025-02-14T14:01:35.532Z
Reserved: 2025-01-02T19:07:31.451Z
Link: CVE-2025-0178

Updated: 2025-02-14T14:01:29.749Z

Status : Received
Published: 2025-02-14T14:15:32.403
Modified: 2025-02-14T14:15:32.403
Link: CVE-2025-0178

No data.