EUVD-2026-18090

| CVE-2026-3987 HIGH
2026-04-01 WatchGuard GHSA-8r96-cj5h-474x
8.6
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
X

Lifecycle Timeline

3
Analysis Generated
Apr 01, 2026 - 22:16 vuln.today
EUVD ID Assigned
Apr 01, 2026 - 22:16 euvd
EUVD-2026-18090
CVE Published
Apr 01, 2026 - 21:32 nvd
HIGH 8.6

Description

A path traversal vulnerability in the Fireware OS Web UI on WatchGuard Firebox systems may allow a privileged authenticated remote attacker to execute arbitrary code in the context of an elevated system process.This issue affects Fireware OS 12.6.1 up to and including 12.11.8 and 2025.1 up to and including 2026.1.2.

Analysis

Remote code execution in WatchGuard Fireware OS versions 12.6.1 through 12.11.8 and 2025.1 through 2026.1.2 allows privileged authenticated attackers to execute arbitrary code with elevated system privileges via path traversal in the Web UI. The vulnerability requires high-level administrative access (CVSS PR:H) but presents a direct RCE path once authenticated. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all WatchGuard Firewall OS deployments and identify systems running versions 12.6.1-12.11.8 or 2025.1-2026.1.2. Within 7 days: Implement strict administrative access controls-restrict Web UI admin accounts to trusted networks only, enforce MFA on administrative logins, and disable remote admin access unless operationally critical. …

Sign in for detailed remediation steps.

Priority Score

43
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +43
POC: 0

Share

EUVD-2026-18090 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy