In the configuration file of racoon in the TRENDnet TEW-WLC100P 2.03b03, the first item of exchage_mode is set to aggressive. Aggressive mode in IKE Phase 1 exposes identity information in plaintext, is vulnerable to offline dictionary attacks, and lacks flexibility in negotiating security parameters.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet
Trendnet tew-wlc100p Trendnet tew-wlc100p Firmware |
|
CPEs | cpe:2.3:h:trendnet:tew-wlc100p:-:*:*:*:*:*:*:* cpe:2.3:o:trendnet:tew-wlc100p_firmware:2.03b03:*:*:*:*:*:*:* |
|
Vendors & Products |
Trendnet
Trendnet tew-wlc100p Trendnet tew-wlc100p Firmware |
Tue, 22 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-312 | |
Metrics |
cvssV3_1
|
Mon, 21 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the configuration file of racoon in the TRENDnet TEW-WLC100P 2.03b03, the first item of exchage_mode is set to aggressive. Aggressive mode in IKE Phase 1 exposes identity information in plaintext, is vulnerable to offline dictionary attacks, and lacks flexibility in negotiating security parameters. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-21T00:00:00.000Z
Updated: 2025-07-22T13:57:17.740Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44649

Updated: 2025-07-22T13:57:10.573Z

Status : Analyzed
Published: 2025-07-21T17:15:37.157
Modified: 2025-08-01T19:37:54.270
Link: CVE-2025-44649

No data.