An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Thegreenbow
Thegreenbow android Vpn Thegreenbow vpn Client Linux Thegreenbow vpn Client Macos Thegreenbow windows Enterprise Vpn Thegreenbow windows Standard Vpn |
|
Weaknesses | CWE-287 | |
CPEs | cpe:2.3:a:thegreenbow:android_vpn:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:vpn_client_linux:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:vpn_client_macos:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_enterprise_vpn:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_standard_vpn:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Thegreenbow
Thegreenbow android Vpn Thegreenbow vpn Client Linux Thegreenbow vpn Client Macos Thegreenbow windows Enterprise Vpn Thegreenbow windows Standard Vpn |
|
Metrics |
cvssV3_1
|
Wed, 25 Sep 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-25T00:00:00
Updated: 2024-09-26T19:02:46.569Z
Reserved: 2024-09-06T00:00:00
Link: CVE-2024-45750
Vulnrichment
Updated: 2024-09-26T18:49:32.215Z
NVD
Status : Awaiting Analysis
Published: 2024-09-25T18:15:05.043
Modified: 2024-09-26T19:35:17.850
Link: CVE-2024-45750
Redhat
No data.