CVE-2025-44647
BaseFortify
Publication date: 2025-07-21
Last updated on: 2025-08-07
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendnet | tew-wlc100p_firmware | 2.03b03 |
| trendnet | tew-wlc100p | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1188 | The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the TRENDnet TEW-WLC100P device running firmware 2.03b03 due to a misconfiguration in the strongSwan VPN software. The configuration enables the option 'i_dont_care_about_security_and_use_aggressive_mode_psk', which allows the use of IKEv1 Aggressive Mode with Pre-Shared Keys (PSKs). In this mode, the hash of the PSK is transmitted openly, allowing attackers to capture it and perform offline brute-force or dictionary attacks to recover the PSK. This weakens the VPN's security by exposing credentials to compromise. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to capture the hash of your VPN's pre-shared key and perform offline attacks to recover it. If the PSK is compromised, attackers can gain unauthorized access to your VPN, potentially intercepting or manipulating your network traffic and compromising the confidentiality and integrity of your communications. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the strongSwan configuration file for the presence of the setting `i_dont_care_about_security_and_use_aggressive_mode_psk=yes` in the `/etc/strongswan.conf` file. For example, use the command `grep i_dont_care_about_security_and_use_aggressive_mode_psk /etc/strongswan.conf` to verify if this insecure option is enabled. Additionally, network monitoring tools can be used to capture IKEv1 Aggressive Mode handshake packets, which reveal the PSK hash transmitted openly. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately disable the `i_dont_care_about_security_and_use_aggressive_mode_psk` option by setting it to `no` or removing it from the `/etc/strongswan.conf` file. This will prevent the use of IKEv1 Aggressive Mode with Pre-Shared Keys, thereby stopping the exposure of the PSK hash. After making the change, restart the strongSwan service to apply the new configuration. Also, consider changing the VPN Pre-Shared Key to a strong, complex value to reduce the risk of offline attacks. [1]