Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Severe Security Flaw in PuTTY Client Exposes Private Keys
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Severe Security Flaw in PuTTY Client Exposes Private Keys

Highlights

  • Severe PuTTY client flaw exposes private keys.

  • Affects FileZilla, WinSCP, TortoiseGit, TortoiseSVN.

  • Immediate software updates critically important.

Samantha Reed
Last updated: 16 April, 2024 - 11:11 am 11:11 am
Samantha Reed 1 year ago
Share
SHARE

A critical security flaw has been identified in the PuTTY client, which is widely used for secure remote access to computers over SSH (Secure Shell) and telnet. This vulnerability, named CVE-2024-31497, allows attackers to recover the complete NIST P-521 private keys by exploiting a bias in the generation of ECDSA (Elliptic Curve Digital Signature Algorithm) nonces. This issue affects not only PuTTY but also other related software that relies on it, such as FileZilla, WinSCP, TortoiseGit, and TortoiseSVN, posing a significant threat to data integrity and security.

Contents
Exploitation and Impact of the VulnerabilityAffected Software and Potential RisksImmediate Actions and MitigationsUseful Information

Exploitation and Impact of the Vulnerability

The vulnerability arises because the ECDSA nonces generated by these programs, when using the NIST P-521 elliptic curve, are not random enough, with the first 9 bits set to zero. This predictability makes it feasible for an attacker to use sophisticated lattice-based techniques to deduce the private key after observing merely 60 valid ECDSA signatures from the same key. The attacker could intercept these signatures from network traffic or any transaction where these signatures are used, making any communication using these keys vulnerable to eavesdropping and data manipulation.

Affected Software and Potential Risks

The scope of this vulnerability encompasses several versions of software that integrate PuTTY’s functionality. Affected versions include FileZilla from 3.24.1 to 3.66.5, WinSCP from 5.9.5 to 6.3.2, TortoiseGit from 2.4.0.2 to 2.15.0, and TortoiseSVN from 1.10.0 to 1.14.6. Users of these applications are at a heightened risk of having their data integrity compromised, which could lead to unauthorized data alterations and potentially severe data breaches.

Immediate Actions and Mitigations

Developers of the affected software have rolled out updates to mitigate this vulnerability. It is crucial for users to install these updates without delay. Updated versions include PuTTY 0.81, FileZilla 3.67.0, WinSCP 6.3.3, TortoiseGit 2.15.1, and TortoiseSVN 1.14.7. By updating to these versions, users can secure their applications from potential exploits deriving from this vulnerability.

Furthermore, exploring related news, articles from sources like Open Source Security have stressed the ongoing risks associated with software vulnerabilities affecting secure communications. Another article from Digital Journal discusses broader impacts of similar vulnerabilities on global cybersecurity practices, emphasizing the need for continual vigilance and timely updates.

Useful Information

  • Update affected software immediately to secure data.
  • Monitor systems for unusual activity indicating a breach.
  • Consider using alternative encryption methods or tools.

To effectively counteract the risks posed by the CVE-2024-31497 vulnerability, it is essential for users and administrators of affected software to prioritize updates that address the issue. Given the potential for attackers to manipulate data or intercept sensitive information, reinforcing security measures is not just advisable but essential. Furthermore, this incident serves as a reminder of the importance of rigorous security practices in software development and the ongoing need to monitor and fortify systems against emerging threats. By staying informed and responsive, users can significantly mitigate the risks associated with such vulnerabilities.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Garmin Rolls Out Exciting Updates for Forerunner Watches
Next Article Why Is FaceTime Not Working Properly?

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Beat Wordle with Smart Strategies and Daily Hints
Gaming
ABB Advances AMR Technology with vSLAM for Enhanced Operations
Robotics
Tesla Semi Gains Momentum with US Foods Collaboration
Electric Vehicle
AMD’s New Graphics Card Threatens Nvidia’s Market Share
Computing
Dodge Charger Hits Tesla Cybertruck in Failed Stunt
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?