Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11955: CWE-299: Improper Check for Certificate Revocation in TheGreenBow TheGreenBow VPN Client Windows Enterprise

0
High
VulnerabilityCVE-2025-11955cvecve-2025-11955cwe-299
Published: Mon Oct 27 2025 (10/27/2025, 11:30:24 UTC)
Source: CVE Database V5
Vendor/Project: TheGreenBow
Product: TheGreenBow VPN Client Windows Enterprise

Description

Incorrect validation of OCSP certificates vulnerability in TheGreenBow VPN, versions 7.5 and 7.6. During the IKEv2 authentication step, the OCSP-enabled VPN client establishes the tunnel even if it does not receive an OCSP response or if the OCSP response signature is invalid.

AI-Powered Analysis

AILast updated: 11/03/2025, 12:23:40 UTC

Technical Analysis

CVE-2025-11955 is a vulnerability classified under CWE-299 (Improper Check for Certificate Revocation) affecting TheGreenBow VPN Client Windows Enterprise versions 7.5 and 7.6. The flaw arises during the IKEv2 authentication phase when the VPN client uses OCSP to verify the revocation status of certificates. Instead of enforcing strict validation, the client improperly accepts the absence of an OCSP response or an OCSP response with an invalid signature, allowing the VPN tunnel to be established regardless. This behavior undermines the security guarantees of certificate-based authentication by permitting revoked or malicious certificates to be accepted. The vulnerability has a CVSS 4.0 score of 8.2, reflecting high severity due to its network attack vector, no required privileges or user interaction, and high impact on confidentiality. Exploitation could enable attackers to gain unauthorized VPN access, potentially leading to lateral movement within corporate networks, data exfiltration, or disruption of services. Although no public exploits are known, the vulnerability's nature makes it a significant risk for organizations relying on TheGreenBow VPN for secure communications. The absence of patches at the time of disclosure necessitates immediate attention to alternative mitigations and monitoring.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of their internal networks. Unauthorized access via compromised or revoked certificates could allow attackers to bypass perimeter defenses, access sensitive data, and move laterally within enterprise environments. Sectors such as finance, government, healthcare, and critical infrastructure that depend on VPNs for secure remote access are particularly vulnerable. The improper OCSP validation could facilitate advanced persistent threats (APTs) or insider threats exploiting revoked credentials. Given the VPN client’s role in securing remote connections, exploitation could disrupt business continuity and erode trust in secure communications. The high CVSS score underscores the potential for severe impact if exploited, especially in environments with high-value assets or regulatory compliance requirements like GDPR.

Mitigation Recommendations

Organizations should immediately audit their use of TheGreenBow VPN Client versions 7.5 and 7.6 and restrict their deployment where possible. Until official patches are released, implement compensating controls such as enforcing strict certificate management policies, including manual revocation checks and certificate pinning where feasible. Enhance network monitoring to detect anomalous VPN connection attempts, especially those involving certificates that may be revoked or suspicious. Employ multi-factor authentication (MFA) to add an additional layer of security beyond certificate validation. Limit VPN access privileges to the minimum necessary and segment networks to reduce potential lateral movement. Engage with TheGreenBow support channels to obtain updates on patch availability and apply them promptly once released. Additionally, consider alternative VPN solutions with robust certificate validation mechanisms if immediate patching is not possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-10-20T11:57:59.432Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff59692359da13b53b5873

Added to database: 10/27/2025, 11:37:13 AM

Last enriched: 11/3/2025, 12:23:40 PM

Last updated: 12/10/2025, 9:03:51 PM

Views: 176

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats