CVE-2024-31497

5.9 MEDIUM
Published: April 15, 2024 Modified: November 04, 2025

Description

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/15/6
Source: cve@mitre.org
Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2275183
Source: cve@mitre.org
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1222864
Source: cve@mitre.org
Issue Tracking
https://filezilla-project.org/versions.php
Source: cve@mitre.org
Release Notes
https://github.com/advisories/GHSA-6p4c-r453-8743
Source: cve@mitre.org
Third Party Advisory
https://github.com/daedalus/BreakingECDSAwithLLL
Source: cve@mitre.org
Third Party Advisory
https://news.ycombinator.com/item?id=40044665
Source: cve@mitre.org
Issue Tracking
https://security-tracker.debian.org/tracker/CVE-2024-31497
Source: cve@mitre.org
Third Party Advisory
https://tortoisegit.org
Source: cve@mitre.org
Third Party Advisory
https://twitter.com/CCBalert/status/1780229237569470549
Source: cve@mitre.org
Press/Media Coverage
https://twitter.com/lambdafu/status/1779969509522133272
Source: cve@mitre.org
Press/Media Coverage
https://winscp.net/eng/news.php
Source: cve@mitre.org
Third Party Advisory
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: cve@mitre.org
Release Notes Vendor Advisory
https://www.openwall.com/lists/oss-security/2024/04/15/6
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/15/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2275183
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1222864
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://filezilla-project.org/versions.php
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://git.tartarus.org/?h=c193fe9848f50a88a4089aac647fecc31ae96d27&p=simon/putty.git
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://github.com/advisories/GHSA-6p4c-r453-8743
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/daedalus/BreakingECDSAwithLLL
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://news.ycombinator.com/item?id=40044665
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://security-tracker.debian.org/tracker/CVE-2024-31497
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://tortoisegit.org
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://twitter.com/CCBalert/status/1780229237569470549
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://twitter.com/lambdafu/status/1779969509522133272
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
https://winscp.net/eng/news.php
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Vendor Advisory
https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.openwall.com/lists/oss-security/2024/04/15/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://www.reddit.com/r/sysadmin/comments/1c4wmoj/putty_vulnerability_affecting_v068_to_v08/
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage

59 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.9 / 10.0
EPSS (Exploit Probability)
19.2%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

putty filezilla-project tortoisegit tigris fedoraproject winscp