CVE-2025-1549
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-12-04
Assigner: WatchGuard Technologies, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| watchguard | mobile_vpn_with_ssl | 12.10.2 |
| watchguard | mobile_vpn_with_ssl | 12.11.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue in the WatchGuard Mobile VPN with SSL client on Windows. It allows a local user to execute arbitrary commands with elevated privileges on the affected Windows system, effectively giving them higher-level access than intended. It is related to and an additional attack path for CVE-2024-4944.
How can this vulnerability impact me? :
The vulnerability can allow a local attacker to gain elevated privileges on a Windows system running the vulnerable WatchGuard Mobile VPN with SSL client. This means the attacker could execute commands with higher permissions, potentially leading to unauthorized system changes, data access, or further compromise of the system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the WatchGuard Mobile VPN with SSL client for Windows to version 12.11.3 or later, as this version resolves the issue.