CVE-2024-45750: n/a
An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel.
AI Analysis
Technical Summary
CVE-2024-45750 is a critical vulnerability identified in multiple versions of TheGreenBow VPN clients, including Windows Standard (≤6.87.108), Windows Enterprise (≤6.87.109 and ≤7.5.007), Android (≤6.4.5), Linux (≤3.4), and MacOS (≤2.4.10) editions. The vulnerability lies in the IKEv2 (Internet Key Exchange version 2) authentication phase, where the VPN client improperly validates ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Specifically, the client accepts malformed or invalid ECDSA signatures during the authentication handshake, which should normally be rejected. This flaw allows a remote unauthenticated attacker to establish a VPN tunnel by bypassing authentication checks and subsequently execute arbitrary code on the client system. The vulnerability is classified under CWE-287 (Improper Authentication), indicating a failure to properly verify credentials. The CVSS v3.1 base score is 7.3 (High), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No public exploits or active exploitation in the wild have been reported yet, but the potential for remote code execution without user interaction makes this a critical threat for organizations using affected VPN clients. The lack of available patches at the time of disclosure necessitates immediate risk mitigation and monitoring.
Potential Impact
The vulnerability allows remote attackers to bypass authentication and execute arbitrary code on affected VPN clients, compromising the confidentiality, integrity, and availability of VPN communications. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and potential lateral movement within enterprise environments. Organizations relying on TheGreenBow VPN clients for secure remote access, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks of data breaches and operational disruption. The ability to exploit this vulnerability without authentication or user interaction increases the attack surface and likelihood of exploitation. Additionally, compromised VPN clients could serve as footholds for further attacks, including deployment of malware or ransomware. The absence of known exploits currently provides a limited window for proactive defense, but the severity and ease of exploitation warrant urgent attention.
Mitigation Recommendations
1. Immediately inventory all TheGreenBow VPN clients in use across all platforms to identify affected versions. 2. Monitor official TheGreenBow communications and CVE databases for patches or updates addressing CVE-2024-45750 and apply them promptly upon release. 3. Until patches are available, restrict VPN client access to trusted networks and IP addresses using firewall rules to limit exposure to potential attackers. 4. Implement network-level intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous IKEv2 authentication attempts or malformed ECDSA signatures. 5. Enforce multi-factor authentication (MFA) where possible to add an additional layer of security beyond the vulnerable VPN client authentication. 6. Educate users and administrators about the vulnerability and encourage vigilance for suspicious VPN behavior or unexpected connection attempts. 7. Consider temporary alternative secure VPN solutions if patching is delayed or if risk tolerance is low. 8. Conduct regular security audits and penetration testing focused on VPN infrastructure to detect potential exploitation attempts early.
Affected Countries
United States, France, Germany, United Kingdom, Canada, Australia, Japan, South Korea, India, Brazil, Netherlands, Switzerland
CVE-2024-45750: n/a
Description
An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45750 is a critical vulnerability identified in multiple versions of TheGreenBow VPN clients, including Windows Standard (≤6.87.108), Windows Enterprise (≤6.87.109 and ≤7.5.007), Android (≤6.4.5), Linux (≤3.4), and MacOS (≤2.4.10) editions. The vulnerability lies in the IKEv2 (Internet Key Exchange version 2) authentication phase, where the VPN client improperly validates ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Specifically, the client accepts malformed or invalid ECDSA signatures during the authentication handshake, which should normally be rejected. This flaw allows a remote unauthenticated attacker to establish a VPN tunnel by bypassing authentication checks and subsequently execute arbitrary code on the client system. The vulnerability is classified under CWE-287 (Improper Authentication), indicating a failure to properly verify credentials. The CVSS v3.1 base score is 7.3 (High), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No public exploits or active exploitation in the wild have been reported yet, but the potential for remote code execution without user interaction makes this a critical threat for organizations using affected VPN clients. The lack of available patches at the time of disclosure necessitates immediate risk mitigation and monitoring.
Potential Impact
The vulnerability allows remote attackers to bypass authentication and execute arbitrary code on affected VPN clients, compromising the confidentiality, integrity, and availability of VPN communications. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and potential lateral movement within enterprise environments. Organizations relying on TheGreenBow VPN clients for secure remote access, especially in sectors like government, finance, healthcare, and critical infrastructure, face elevated risks of data breaches and operational disruption. The ability to exploit this vulnerability without authentication or user interaction increases the attack surface and likelihood of exploitation. Additionally, compromised VPN clients could serve as footholds for further attacks, including deployment of malware or ransomware. The absence of known exploits currently provides a limited window for proactive defense, but the severity and ease of exploitation warrant urgent attention.
Mitigation Recommendations
1. Immediately inventory all TheGreenBow VPN clients in use across all platforms to identify affected versions. 2. Monitor official TheGreenBow communications and CVE databases for patches or updates addressing CVE-2024-45750 and apply them promptly upon release. 3. Until patches are available, restrict VPN client access to trusted networks and IP addresses using firewall rules to limit exposure to potential attackers. 4. Implement network-level intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous IKEv2 authentication attempts or malformed ECDSA signatures. 5. Enforce multi-factor authentication (MFA) where possible to add an additional layer of security beyond the vulnerable VPN client authentication. 6. Educate users and administrators about the vulnerability and encourage vigilance for suspicious VPN behavior or unexpected connection attempts. 7. Consider temporary alternative secure VPN solutions if patching is delayed or if risk tolerance is low. 8. Conduct regular security audits and penetration testing focused on VPN infrastructure to detect potential exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf1b7ef31ef0b56a5ec
Added to database: 2/25/2026, 9:43:13 PM
Last enriched: 2/26/2026, 8:18:03 AM
Last updated: 4/12/2026, 3:35:08 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.