Site icon Trend Bulletin

How to Prevent Private Key Recovery Attack PuTTY SSH Client?

How to Prevent Private Key Recovery Attack PuTTY SSH Client?

Prevent Private Key Recovery Attacks in PuTTY SSH Client

Understanding the Vulnerability

Critical vulnerability (CVE-2024-31497) in the widely-used PuTTY SSH client allows attackers to recover NIST P-521 (ecdsa-sha2-nistp521) private keys. This flaw arises when using the specific elliptic curve (NIST P-521) for ECDSA (Elliptic Curve Digital Signature Algorithm) key generation.

Cause of the Issue

The vulnerability stems from the biased ECDSA cryptographic nonces generated by the PuTTY client, enabling attackers to recover the private key. Specifically, the first 9 bits of each nonce are zero, making the recovery possible through advanced techniques after obtaining approximately 60 valid ECDSA signatures.

Attacker’s Goal

Exploiting this vulnerability, an attacker can forge digital signatures and gain unauthorized access to servers or resources protected by the compromised keys. This can lead to sensitive data theft, system compromise, or impersonation attacks.

How to Protect Yourself

To prevent private key recovery attacks in PuTTY SSH client, follow these steps:

Affected Products

Besides PuTTY, other products that incorporate the vulnerable version of the software are also affected:

These products have released updated versions (e.g., FileZilla 3.67.0, WinSCP 6.3.3) that address the vulnerability.

Additional Resources

PuTTY Security Advisory
Researchers’ Paper on the Vulnerability
Twitter Announcement by Researcher Fabian Bäumer

also read:How to detect if a Linux system is vulnerable to the backdoor in xz Utils?

Exit mobile version