An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thegreenbow
Thegreenbow android Vpn Thegreenbow vpn Client Linux Thegreenbow vpn Client Macos Thegreenbow windows Enterprise Vpn Thegreenbow windows Standard Vpn |
|
| Weaknesses | CWE-287 | |
| CPEs | cpe:2.3:a:thegreenbow:android_vpn:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:vpn_client_linux:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:vpn_client_macos:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_enterprise_vpn:*:*:*:*:*:*:*:* cpe:2.3:a:thegreenbow:windows_standard_vpn:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Thegreenbow
Thegreenbow android Vpn Thegreenbow vpn Client Linux Thegreenbow vpn Client Macos Thegreenbow windows Enterprise Vpn Thegreenbow windows Standard Vpn |
|
| Metrics |
cvssV3_1
|
Wed, 25 Sep 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-26T19:02:46.569Z
Reserved: 2024-09-06T00:00:00
Link: CVE-2024-45750
Updated: 2024-09-26T18:49:32.215Z
Status : Awaiting Analysis
Published: 2024-09-25T18:15:05.043
Modified: 2024-09-26T19:35:17.850
Link: CVE-2024-45750
No data.
OpenCVE Enrichment
No data.