CVE-2025-44647
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-08-07

Assigner: MITRE

Description
In TRENDnet TEW-WLC100P 2.03b03, the i_dont_care_about_security_and_use_aggressive_mode_psk option is enabled in the strongSwan configuration file, so that IKE Responders are allowed to use IKEv1 Aggressive Mode with Pre-Shared Keys to conduct offline attacks on the openly transmitted hash of the PSK.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
trendnet tew-wlc100p_firmware 2.03b03
trendnet tew-wlc100p *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1188 The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the TRENDnet TEW-WLC100P device running firmware 2.03b03 due to a misconfiguration in the strongSwan VPN software. The configuration enables the option 'i_dont_care_about_security_and_use_aggressive_mode_psk', which allows the use of IKEv1 Aggressive Mode with Pre-Shared Keys (PSKs). In this mode, the hash of the PSK is transmitted openly, allowing attackers to capture it and perform offline brute-force or dictionary attacks to recover the PSK. This weakens the VPN's security by exposing credentials to compromise. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to capture the hash of your VPN's pre-shared key and perform offline attacks to recover it. If the PSK is compromised, attackers can gain unauthorized access to your VPN, potentially intercepting or manipulating your network traffic and compromising the confidentiality and integrity of your communications. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the strongSwan configuration file for the presence of the setting `i_dont_care_about_security_and_use_aggressive_mode_psk=yes` in the `/etc/strongswan.conf` file. For example, use the command `grep i_dont_care_about_security_and_use_aggressive_mode_psk /etc/strongswan.conf` to verify if this insecure option is enabled. Additionally, network monitoring tools can be used to capture IKEv1 Aggressive Mode handshake packets, which reveal the PSK hash transmitted openly. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately disable the `i_dont_care_about_security_and_use_aggressive_mode_psk` option by setting it to `no` or removing it from the `/etc/strongswan.conf` file. This will prevent the use of IKEv1 Aggressive Mode with Pre-Shared Keys, thereby stopping the exposure of the PSK hash. After making the change, restart the strongSwan service to apply the new configuration. Also, consider changing the VPN Pre-Shared Key to a strong, complex value to reduce the risk of offline attacks. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart