Metrics
Affected Vendors & Products
No advisories yet.
Solution
The feature that was vulnerable has been removed in the next minor version (version 7.7). It will be properly reintroduced in the next major version. To verify certificate revocation, it is recommended to use the CRL verification function of VPN clients.
Workaround
No workaround given by the vendor.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Thegreenbow Thegreenbow ipsec Vpn Client Thegreenbow thegreenbow Vpn Client Thegreenbow vpn Client Linux Thegreenbow windows Enterprise Certified Vpn Thegreenbow windows Enterprise Vpn |
|
| Vendors & Products |
Microsoft
Microsoft windows Thegreenbow Thegreenbow ipsec Vpn Client Thegreenbow thegreenbow Vpn Client Thegreenbow vpn Client Linux Thegreenbow windows Enterprise Certified Vpn Thegreenbow windows Enterprise Vpn |
Mon, 27 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect validation of OCSP certificates vulnerability in TheGreenBow VPN, versions 7.5 and 7.6. During the IKEv2 authentication step, the OCSP-enabled VPN client establishes the tunnel even if it does not receive an OCSP response or if the OCSP response signature is invalid. | |
| Title | Incorrect validation of OCSP certificates in TheGreenBow VPN Client Windows Enterprise | |
| Weaknesses | CWE-299 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-27T13:19:15.842Z
Reserved: 2025-10-20T11:57:59.432Z
Link: CVE-2025-11955
Updated: 2025-10-27T13:19:09.379Z
Status : Awaiting Analysis
Published: 2025-10-27T12:15:32.670
Modified: 2025-10-27T13:19:49.063
Link: CVE-2025-11955
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:04:14Z