Key recovery attack vulnerability in PuTTY, WinSCP and FileZilla - CVE-2024-31497ID: oval:org.secpod.oval:def:99096 | Date: (C)2024-04-16 (M)2024-04-25 |
Class: VULNERABILITY | Family: windows |
The host is installed with PuTTY 0.68 before 0.81, WinSCP before 6.3.3, FileZilla before 3.67.0 and is prone to a key recovery attack vulnerability. A flaw is present in the application, which fails to properly handle issues in the ECDSA nonce generation. Successful exploitation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures and further after a key compromise an attacker may be able to conduct supply-chain attacks on software maintained in Git.
Platform: |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows 11 |
Product: |
PuTTY |
WinSCP |
FileZilla |