CVE-2025-44647

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to conduct offline brute-force attacks against the TRENDnet TEW-WLC100P wireless LAN controller's VPN configuration. By exploiting IKEv1 Aggressive Mode with Pre-Shared Keys, attackers can capture and crack the PSK hash transmitted in the clear. This affects all users of TRENDnet TEW-WLC100P version 2.03b03 with strongSwan VPN enabled.

💻 Affected Systems

Products:
  • TRENDnet TEW-WLC100P
Versions: 2.03b03
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with strongSwan VPN configured and using IKEv1 with PSK authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete VPN compromise allowing unauthorized network access, data interception, and potential lateral movement into connected networks.

🟠

Likely Case

VPN credential theft leading to unauthorized VPN access and potential man-in-the-middle attacks on VPN traffic.

🟢

If Mitigated

Limited to failed authentication attempts if strong PSKs are used and network monitoring detects brute-force attempts.

🌐 Internet-Facing: HIGH - VPN endpoints exposed to the internet are directly vulnerable to remote attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this but require network access to capture IKE traffic.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires capturing IKEv1 Aggressive Mode handshake packets, then offline PSK hash cracking.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: http://tew-wlc100p.com

Restart Required: No

Instructions:

1. Access TRENDnet TEW-WLC100P web interface
2. Navigate to VPN settings
3. Disable IKEv1 Aggressive Mode
4. Use IKEv2 or Main Mode instead
5. Consider switching to certificate-based authentication

🔧 Temporary Workarounds

Disable IKEv1 Aggressive Mode

linux

Modify strongSwan configuration to disable aggressive mode and enforce main mode

Edit /etc/ipsec.conf or equivalent config file
Set 'aggressive=no' in conn sections
Restart strongSwan service

Enforce Strong PSK

all

Use complex, long pre-shared keys to make offline cracking impractical

Generate 32+ character random PSK
Update PSK on all VPN endpoints

🧯 If You Can't Patch

  • Segment VPN traffic to isolated network segment
  • Implement network monitoring to detect IKEv1 Aggressive Mode handshakes

🔍 How to Verify

Check if Vulnerable:

Check strongSwan configuration file for 'i_dont_care_about_security_and_use_aggressive_mode_psk=yes' or aggressive mode enabled in conn definitions.

Check Version:

Check web interface or use 'ipsec --version' on device CLI

Verify Fix Applied:

Verify aggressive mode is disabled in configuration and test VPN connection uses Main Mode or IKEv2.

📡 Detection & Monitoring

Log Indicators:

  • IKEv1 Aggressive Mode handshake attempts
  • Multiple failed authentication attempts from single source

Network Indicators:

  • IKEv1 Aggressive Mode packets (UDP port 500)
  • PSK hash in cleartext during handshake

SIEM Query:

source_port:500 AND protocol:udp AND (packet_content:"aggressive" OR packet_content:"hash")

🔗 References

📤 Share & Export