Vulnerability

Critical PuTTY Client Vulnerability Lets Attackers Recover Private Keys

A severe vulnerability has been discovered in the PuTTY client and related components, allowing attackers to fully recover NIST P-521 private keys.

The PuTTY client generates heavily biased ECDSA nonces when using the NIST P-521 elliptic curve, causing the vulnerability tracked as CVE-2024-31497.

PuTTY Client Vulnerability

The PuTTY client and all related components, including FileZilla, WinSCP, TortoiseGit, and TortoiseSVN, generate ECDSA nonces with the first 9 bits set to zero when using the NIST P-521 elliptic curve.

This significant bias in the nonce generation allows attackers to recover the full private key after observing roughly 60 valid ECDSA signatures from the same key.

The attack works by leveraging state-of-the-art lattice-based techniques to recover the private key from the biased nonces.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

An attacker can either harvest the signatures from a malicious server (since the signatures are transmitted over the secure SSH channel) or from any other source, such as signed git commits.

“All NIST P-521 client keys used with PuTTY must be considered compromised, given that the attack can be carried out even after the root cause has been fixed in the source code (assuming that ~60 pre-patch signatures are available to an adversary),” the advisory states.

Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

Impact and Affected Products

The nonce bias vulnerability allows for full secret key recovery of NIST P-521 keys after an attacker has observed approximately 60 valid ECDSA signatures generated by any PuTTY component under the same key.

This means that the attacker can forge any data signed with these compromised keys, such as git commits.

The following PuTTY-related products are affected by this vulnerability:

  • FileZilla 3.24.1 – 3.66.5
  • WinSCP 5.9.5 – 6.3.2
  • TortoiseGit 2.4.0.2 – 2.15.0
  • TortoiseSVN 1.10.0 – 1.14.6[1]

Mitigations

The vulnerability has been fixed in the latest versions of the affected products:

  • PuTTY 0.81
  • FileZilla 3.67.0
  • WinSCP 6.3.3
  • TortoiseGit 2.15.1
  • TortoiseSVN 1.14.7

Users are strongly advised to update to these patched versions as soon as possible to mitigate the risk of private key compromise.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Rutger Stealer Hijacking Logins from Discord, Skype & other Apps

Cybersecurity experts have identified a new malware, Rutger Stealer, specifically designed to hijack login credentials…

2 hours ago

Token Infrastructure Platform Hacked: $44.5 Million Stolen in Cryptos

Hedgey Finance, a prominent token infrastructure platform, has reported a massive theft of approximately $44.5…

2 hours ago

Judge0 Security Flaw Let Attackers Run Arbitrary Code & Gain Root Access

Tanto Security has disclosed critical vulnerabilities in the widely-used open-source service Judge0, which could allow…

4 hours ago

HookChain – A New Sophisticated Technique Evades EDR Detection

In the rapidly evolving, complex threat landscape, EDR companies are constantly racing against new vectors.…

4 hours ago

Hackers Took Just 29-Days From IcedID Infection to Dagon Locker Ransomware

In a sophisticated cyberattack that unfolded over 29 days, cybersecurity analysts have meticulously traced the…

6 hours ago

Telegram Web App Vulnerability Let Attackers Hijack Sessions

A new vulnerability has been discovered in Telegram, allowing a threat actor to hijack a…

7 hours ago