CVE-2019-25283

Shrew Soft · Shrew Soft VPN Client 2

Shrew Soft VPN Client 2 is vulnerable to a high-severity security flaw that could lead to local privilege escalation or the compromise of secure network tunnels.

Executive summary

Shrew Soft VPN Client 2 contains a high-severity vulnerability that could allow an attacker to compromise secure remote access and gain elevated system rights.

Vulnerability

This vulnerability in Shrew Soft VPN Client 2, which has a CVSS score of 7.8, typically involves issues with the service's handling of local system privileges or vulnerabilities in the IKE daemon. An attacker could exploit this to gain higher-level access to the host Windows machine.

Business impact

A compromise of the VPN client can lead to the theft of VPN credentials and subsequent unauthorized access to the corporate internal network. The 7.8 CVSS score indicates a high risk, particularly for organizations that still rely on this legacy client for IPsec VPN connectivity.

Remediation

Immediate Action: Replace Shrew Soft VPN Client 2 with a modern, supported IPsec client or migrate to a different VPN technology (such as WireGuard or OpenVPN) that is actively maintained.

Proactive Monitoring: Check for unauthorized modifications to the Windows Registry or the VPN client's configuration files that could indicate an exploitation attempt.

Compensating Controls: Use strict network segmentation and Multi-Factor Authentication (MFA) at the VPN gateway to limit the impact of a compromised endpoint.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The 7.8 CVSS score and the legacy status of Shrew Soft VPN Client 2 make it a significant liability. Security teams should prioritize the decommissioning of this software across the enterprise and transition users to modern, secure remote access alternatives.