CVE-2026-3344
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in WatchGuard Fireware OS to bypass security checks on the system's files, allowing them to install a malicious firmware update that can maintain limited control over the device. This vulnerability affects specific versions of Fireware OS and requires the attacker to craft a specially designed firmware package to take advantage of it.
Technical Description
A vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fireware OS filesystem integrity check and maintain limited persistence via a maliciously-crafted firmware update package.This issue affects Fireware OS 12.0 up to and including 12.11.7, 12.5.9 up to and including 12.5.16, and 2025.1 up to and including 2026.1.1.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 4, 2026
about 1 month ago
Vendor
watchguard
Product
fireware
Related Vulnerabilities
An attacker can trick an authenticated management user of Fireware OS into executing harmful JavaScript by clicking on a specially crafted link, potentially compromising their session or stealing sensitive information. This vulnerability affects specific versions of Fireware OS and requires the user to be logged in to the management interface when they click the link.
This vulnerability allows an attacker with administrative access to the WatchGuard Fireware OS to run any code they want with full control over the system. It affects specific versions of the software and requires the attacker to be logged in as a privileged administrator to exploit it.