CVE-2025-8763: Missing Encryption of Sensitive Data in Ruijie EG306MG
A vulnerability was found in Ruijie EG306MG 3.0(1)B11P309. It has been rated as problematic. This issue affects some unknown processing of the file /etc/strongswan.conf of the component strongSwan. The manipulation of the argument i_dont_care_about_security_and_use_aggressive_mode_psk leads to missing encryption of sensitive data. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8763 is a vulnerability identified in the Ruijie EG306MG device running firmware version 3.0(1)B11P309. The issue arises from improper handling of the /etc/strongswan.conf configuration file, specifically related to the manipulation of the argument named i_dont_care_about_security_and_use_aggressive_mode_psk. This parameter appears to control the use of aggressive mode with a pre-shared key (PSK) in strongSwan, an IPsec implementation used for VPN connections. The vulnerability results in missing encryption of sensitive data, meaning that certain critical information that should be protected by encryption is instead exposed in plaintext or insufficiently protected. The attack vector is remote, indicating that an attacker does not require physical access to the device to exploit this flaw. However, the attack complexity is rated as high, and exploitation is considered difficult, suggesting that successful exploitation requires advanced skills or specific conditions. No authentication or user interaction is needed, but the vulnerability only impacts the confidentiality of data (VC:L), with no impact on integrity or availability. The vendor Ruijie has not responded to disclosure attempts, and no patches or mitigations have been released at the time of publication. The CVSS v4.0 score is 6.3 (medium severity), reflecting the moderate risk posed by this vulnerability. No known exploits are currently in the wild. The vulnerability affects a specific firmware version of the EG306MG device, which is a network appliance likely used in enterprise or service provider environments for VPN or secure communications.
Potential Impact
For European organizations, the impact of CVE-2025-8763 could be significant in environments where Ruijie EG306MG devices are deployed, particularly in VPN infrastructures relying on strongSwan for secure communications. The missing encryption of sensitive data could lead to exposure of confidential information such as VPN credentials, session keys, or configuration details, potentially allowing attackers to intercept or decrypt VPN traffic. This compromises confidentiality and could facilitate further network intrusion or data exfiltration. Although exploitation is difficult, the remote attack vector means that attackers could attempt to leverage this vulnerability without physical access, increasing the risk surface. European organizations in sectors with high security requirements—such as finance, government, healthcare, and critical infrastructure—may face increased risks if these devices are part of their network security architecture. The lack of vendor response and absence of patches exacerbate the risk, as organizations cannot rely on official fixes and must implement compensating controls. Additionally, exposure of sensitive VPN data could violate European data protection regulations like GDPR if personal or sensitive data is compromised, leading to legal and reputational consequences.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should take proactive and specific steps to mitigate this vulnerability: 1) Immediately audit network environments to identify any Ruijie EG306MG devices running the affected firmware version 3.0(1)B11P309. 2) Disable or avoid using aggressive mode with pre-shared keys in strongSwan configurations on these devices, as this is the root cause of the missing encryption. Instead, configure strongSwan to use more secure modes such as main mode with certificate-based authentication. 3) Restrict remote management and access to the affected devices by implementing strict firewall rules, VPN access controls, and network segmentation to limit exposure to untrusted networks. 4) Monitor network traffic for unusual or unauthorized access attempts targeting these devices, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 5) Consider replacing or upgrading affected devices to newer models or firmware versions once patches become available or if alternative secure solutions exist. 6) Educate network administrators about the risks of using aggressive mode PSK and enforce secure VPN configuration policies. 7) If possible, implement additional encryption layers or endpoint security measures to protect sensitive data in transit and at rest. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable configuration and device context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-8763: Missing Encryption of Sensitive Data in Ruijie EG306MG
Description
A vulnerability was found in Ruijie EG306MG 3.0(1)B11P309. It has been rated as problematic. This issue affects some unknown processing of the file /etc/strongswan.conf of the component strongSwan. The manipulation of the argument i_dont_care_about_security_and_use_aggressive_mode_psk leads to missing encryption of sensitive data. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8763 is a vulnerability identified in the Ruijie EG306MG device running firmware version 3.0(1)B11P309. The issue arises from improper handling of the /etc/strongswan.conf configuration file, specifically related to the manipulation of the argument named i_dont_care_about_security_and_use_aggressive_mode_psk. This parameter appears to control the use of aggressive mode with a pre-shared key (PSK) in strongSwan, an IPsec implementation used for VPN connections. The vulnerability results in missing encryption of sensitive data, meaning that certain critical information that should be protected by encryption is instead exposed in plaintext or insufficiently protected. The attack vector is remote, indicating that an attacker does not require physical access to the device to exploit this flaw. However, the attack complexity is rated as high, and exploitation is considered difficult, suggesting that successful exploitation requires advanced skills or specific conditions. No authentication or user interaction is needed, but the vulnerability only impacts the confidentiality of data (VC:L), with no impact on integrity or availability. The vendor Ruijie has not responded to disclosure attempts, and no patches or mitigations have been released at the time of publication. The CVSS v4.0 score is 6.3 (medium severity), reflecting the moderate risk posed by this vulnerability. No known exploits are currently in the wild. The vulnerability affects a specific firmware version of the EG306MG device, which is a network appliance likely used in enterprise or service provider environments for VPN or secure communications.
Potential Impact
For European organizations, the impact of CVE-2025-8763 could be significant in environments where Ruijie EG306MG devices are deployed, particularly in VPN infrastructures relying on strongSwan for secure communications. The missing encryption of sensitive data could lead to exposure of confidential information such as VPN credentials, session keys, or configuration details, potentially allowing attackers to intercept or decrypt VPN traffic. This compromises confidentiality and could facilitate further network intrusion or data exfiltration. Although exploitation is difficult, the remote attack vector means that attackers could attempt to leverage this vulnerability without physical access, increasing the risk surface. European organizations in sectors with high security requirements—such as finance, government, healthcare, and critical infrastructure—may face increased risks if these devices are part of their network security architecture. The lack of vendor response and absence of patches exacerbate the risk, as organizations cannot rely on official fixes and must implement compensating controls. Additionally, exposure of sensitive VPN data could violate European data protection regulations like GDPR if personal or sensitive data is compromised, leading to legal and reputational consequences.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should take proactive and specific steps to mitigate this vulnerability: 1) Immediately audit network environments to identify any Ruijie EG306MG devices running the affected firmware version 3.0(1)B11P309. 2) Disable or avoid using aggressive mode with pre-shared keys in strongSwan configurations on these devices, as this is the root cause of the missing encryption. Instead, configure strongSwan to use more secure modes such as main mode with certificate-based authentication. 3) Restrict remote management and access to the affected devices by implementing strict firewall rules, VPN access controls, and network segmentation to limit exposure to untrusted networks. 4) Monitor network traffic for unusual or unauthorized access attempts targeting these devices, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 5) Consider replacing or upgrading affected devices to newer models or firmware versions once patches become available or if alternative secure solutions exist. 6) Educate network administrators about the risks of using aggressive mode PSK and enforce secure VPN configuration policies. 7) If possible, implement additional encryption layers or endpoint security measures to protect sensitive data in transit and at rest. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable configuration and device context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-08T15:42:24.217Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6897e8eaad5a09ad000f48e7
Added to database: 8/10/2025, 12:33:46 AM
Last enriched: 8/17/2025, 12:59:28 AM
Last updated: 11/7/2025, 5:26:37 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-22894: n/a
CriticalCVE-2023-22893: n/a
HighCVE-2023-22621: n/a
CriticalCVE-2025-7719: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GE Vernova Smallworld
MediumCVE-2025-63785: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.