CVE-2024-45750

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected TheGreenBow VPN clients by sending malformed ECDSA signatures during IKEv2 authentication. Attackers can exploit this to take full control of systems running vulnerable VPN clients. All users of TheGreenBow VPN clients across Windows, Android, Linux, and macOS platforms with specified versions are affected.

💻 Affected Systems

Products:
  • TheGreenBow Windows Standard VPN Client
  • TheGreenBow Windows Enterprise VPN Client
  • TheGreenBow Android VPN Client
  • TheGreenBow VPN Client Linux
  • TheGreenBow VPN Client MacOS
Versions: Windows Standard VPN Client 6.87.108 and older, Windows Enterprise VPN Client 6.87.109 and older, Windows Enterprise VPN Client 7.5.007 and older, Android VPN Client 6.4.5 and older, VPN Client Linux 3.4 and older, VPN Client MacOS 2.4.10 and older
Operating Systems: Windows, Android, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using IKEv2 authentication with ECDSA signatures are vulnerable. The vulnerability is in the authentication phase, so any VPN connection attempt could trigger it.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, steal credentials, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data exfiltration, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if VPN clients are isolated or network segmentation prevents lateral movement, though the initial system remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed signatures during IKEv2 authentication, which is a standard protocol phase. No authentication is needed to initiate the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.thegreenbow.com/en/support/security-alerts/#deeplink-17024

Restart Required: Yes

Instructions:

1. Visit the vendor advisory URL. 2. Identify the latest patched version for your product. 3. Download and install the update from the official vendor website. 4. Restart the system to apply changes.

🔧 Temporary Workarounds

Disable IKEv2 Authentication

all

Switch to alternative authentication methods if supported (e.g., IKEv1 with different signature algorithms).

Network Segmentation

all

Isolate VPN clients from critical internal resources using firewalls or network segmentation.

🧯 If You Can't Patch

  • Disconnect vulnerable VPN clients from networks until patched.
  • Implement strict network monitoring for unusual IKEv2 authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of TheGreenBow VPN client against the affected version list. If using an affected version, the system is vulnerable.

Check Version:

On Windows: Check 'About' in the VPN client GUI or examine installed programs. On Linux/macOS: Check package manager or application version info.

Verify Fix Applied:

After updating, verify the installed version matches or exceeds the patched version specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Failed IKEv2 authentication attempts with malformed signatures
  • Unexpected VPN connection drops or errors

Network Indicators:

  • Unusual IKEv2 traffic patterns from untrusted sources
  • Spike in authentication phase traffic

SIEM Query:

Search for IKEv2 authentication failures or VPN client crashes in system logs.

🔗 References

📤 Share & Export