Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45750: n/a

0
High
VulnerabilityCVE-2024-45750cvecve-2024-45750
Published: Wed Sep 25 2024 (09/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:18:03 UTC

Technical Analysis

CVE-2024-45750 is a critical vulnerability identified in multiple versions of TheGreenBow VPN clients, including Windows Standard (≤6.87.108), Windows Enterprise (≤6.87.109 and ≤7.5.007), Android (≤6.4.5), Linux (≤3.4), and MacOS (≤2.4.10) editions. The vulnerability lies in the IKEv2 (Internet Key Exchange version 2) authentication phase, where the VPN client improperly validates ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Specifically, the client accepts malformed or invalid ECDSA signatures during the authentication handshake, which should normally be rejected. This flaw allows a remote unauthenticated attacker to establish a VPN tunnel by bypassing authentication checks and subsequently execute arbitrary code on the client system. The vulnerability is classified under CWE-287 (Improper Authentication), indicating a failure to properly verify credentials. The CVSS v3.1 base score is 7.3 (High), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No public exploits or active exploitation in the wild have been reported yet, but the potential for remote code execution without user interaction makes this a critical threat for organizations using affected VPN clients. The lack of available patches at the time of disclosure necessitates immediate risk mitigation and monitoring.

Potential Impact

The vulnerability allows remote attackers to bypass authentication and execute arbitrary code on affected VPN clients, compromising the confidentiality, integrity, and availability of VPN communications. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and potential lateral movement within enterprise environments. Organizations relying on TheGreenBow VPN clients for secure remote access, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks of data breaches and operational disruption. The ability to exploit this vulnerability without authentication or user interaction increases the attack surface and likelihood of exploitation. Additionally, compromised VPN clients could serve as footholds for further attacks, including deployment of malware or ransomware. The absence of known exploits currently provides a limited window for proactive defense, but the severity and ease of exploitation warrant urgent attention.

Mitigation Recommendations

1. Immediately inventory all TheGreenBow VPN clients in use across all platforms to identify affected versions. 2. Monitor official TheGreenBow communications and CVE databases for patches or updates addressing CVE-2024-45750 and apply them promptly upon release. 3. Until patches are available, restrict VPN client access to trusted networks and IP addresses using firewall rules to limit exposure to potential attackers. 4. Implement network-level intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous IKEv2 authentication attempts or malformed ECDSA signatures. 5. Enforce multi-factor authentication (MFA) where possible to add an additional layer of security beyond the vulnerable VPN client authentication. 6. Educate users and administrators about the vulnerability and encourage vigilance for suspicious VPN behavior or unexpected connection attempts. 7. Consider temporary alternative secure VPN solutions if patching is delayed or if risk tolerance is low. 8. Conduct regular security audits and penetration testing focused on VPN infrastructure to detect potential exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a5ec

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/26/2026, 8:18:03 AM

Last updated: 4/12/2026, 3:35:08 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses