Urgent PuTTY Update Fixes Critical Vulnerability Allowing Private Key Theft

Discover the critical update for PuTTY addressing CVE-2024-31497, which fixes a severe vulnerability that could expose private keys to unauthorized access.

On April 18, 2024, it was reported that a severe security flaw, identified as CVE-2024-31497, had been discovered in PuTTY, a widely used SSH and Telnet tool.

This vulnerability affects versions 0.68 to 0.80 of the software and could allow attackers to reconstruct private keys using only 60 signatures.

The vulnerability was found in the tool’s SSH authentication process, where ECDSA nonces are generated deterministically using the NIST P-521 curve, leading to potential biases.

putty urgent critical fix

Researchers Fabian Bäumer and Marcus Brinkmann from Ruhr University Bochum uncovered this flaw.

They demonstrated that with access to several signed messages and the corresponding public key, attackers could recover private keys, enabling them to forge signatures and access servers without authorization.

In response, official updates have been released for affected software, including PuTTY version 0.81, FileZilla 3.67.0, WinSCP 6.3.3, and TortoiseGit 2.15.0.1, addressing the flaw.

The severity of this issue has prompted urgent updates from administrators and users, especially those utilizing ECDSA NIST-P521 keys in products or components, to prevent unauthorized access and potential data breaches.

Keep visiting for more such awesome posts, internet tips, lifestyle tips, and remember we cover,
“Everything under the Sun!”

Inspire2Rise Logo Org

Follow Inspire2rise on Twitter. | Follow Inspire2rise on Facebook. | Follow Inspire2rise on YouTube

Sukhdev has a passion for sharing insights and experiences on a wide range of topics from technology to personal development!


Learn more about  Apple iPhone XR 2019 to have 2X optical zoom and more!
Urgent PuTTY Update Fixes Critical Vulnerability Allowing Private Key Theft

Leave a Comment

Discover more from Inspire2Rise

Subscribe now to keep reading and get access to the full archive.

Continue reading