{"id":33778,"date":"2024-04-18T00:57:15","date_gmt":"2024-04-17T22:57:15","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33778"},"modified":"2024-04-18T01:18:39","modified_gmt":"2024-04-17T23:18:39","slug":"kritische-putty-schwachstelle-cve-2024-31497-verrt-private-schlssel","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/04\/18\/kritische-putty-schwachstelle-cve-2024-31497-verrt-private-schlssel\/","title":{"rendered":"Critical PuTTY vulnerability CVE-2024-31497 leaks private keys"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/04\/17\/kritische-putty-schwachstelle-cve-2024-31497-verrt-private-schlssel\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The free software PuTTY can be used to establish connections via Secure Shell, Telnet, remote login or serial interfaces with a server. However, there is a critical vulnerability in the software in question (CVE-2024-31497) that can be used to reconstruct private SSH keys. PuTTY versions 0.68 to 0.80 as well as other products (FileZilla for example) are affected. However, it is not enough to update the products to a patched version, as the keys may already be reconstructed.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/810453ae1a4f4285b2b2df65a34df818\" alt=\"\" width=\"1\" height=\"1\" \/><a href=\"https:\/\/en.wikipedia.org\/wiki\/PuTTY\" target=\"_blank\" rel=\"noopener\">PuTTY<\/a>\u00a0is free software for establishing connections via Secure Shell (SSH), Telnet, remote login or serial interfaces. PuTTY serves as a client and establishes the connection to a server. When the connection is established, the user's identity is verified using one of the provided authentication methods. PuTTY is available for Windows and Linux. In the text-oriented terminal session provided, commands can be issued directly and executed on the remote system. Graphical output is not possible, but an X server running on the client computer can be used. In addition, IPv6 is supported from version 0.58 and the serial interface from version 0.59.<\/p>\n<h2>PuTTY vulnerability CVE-2024-31497<\/h2>\n<p>PuTTY (versions 0.68 to 0.80) contains the critical vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-31497\" target=\"_blank\" rel=\"noopener\">CVE-2024-31497<\/a>, which allows an attacker to reconstruct the NIST P-521 private key using approximately 60 signatures. The vulnerability was discovered by <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/04\/15\/6\" target=\"_blank\" rel=\"noopener\">Fabian B\u00e4umer and Marcus Brinkmann<\/a> (Ruhr University Bochum).<\/p>\n<p><a href=\"https:\/\/securityonline.info\/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required\/?expand_article=1#google_vignette\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"PuTTY vulnerability CVE-2024-31497 \" src=\"https:\/\/i.postimg.cc\/nzVrmf19\/image.png\" alt=\"PuTTY vulnerability CVE-2024-31497 \" \/><\/a><\/p>\n<p>Das Problem ist, dass der PuTTY-Client und alle zugeh\u00f6rigen Komponenten stark mit einem BIAS versehene ECDSA-Nonces im Fall von NIST P-521 erzeugen. Die Entdecker geben an, dass die ersten 9 Bits jeder ECDSA-Nonce Null sind. Dies erm\u00f6glicht einen vollst\u00e4ndigen geheimen privaten Schl\u00fcssel in rund 60 Signaturen unter Einsatz modernster Techniken zu rekonstruieren. Die dazu ben\u00f6tigten Signaturen k\u00f6nnen entweder von einem b\u00f6swilligen Server erfasst werden (Man-in-the-Middle-Angriffe sind nicht m\u00f6glich) oder aus einer anderen Quelle, z.B. signierte Git-Commits \u00fcber weitergeleitete Agenten.<\/p>\n<p>In other words, an attacker may already have enough signature information to compromise a victim's private key. This applies even if vulnerable PuTTY versions are no longer used. Following a key compromise, an attacker may be able to conduct supply chain attacks on software managed in Git.<\/p>\n<p>A second, independent scenario, according <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-31497\" target=\"_blank\" rel=\"noopener\">to NIST<\/a>, is where the attacker is an operator of an SSH server to which the victim authenticates (for remote login or file copying), even though the victim does not fully trust that server and that Victim used the same private key for SSH connections to other services operated by other companies. Here, the fraudulent server operator (who would otherwise have no way of discovering the victim's private key) can derive the victim's private key and then use it to gain unauthorized access to these other services.<\/p>\n<p>Wenn die anderen Dienste Git-Dienste umfassen, ist es wiederum m\u00f6glich, Supply-Chain-Angriffe auf in Git verwaltete Software durchzuf\u00fchren. Dies betrifft beispielsweise auch FileZilla vor 3.67.0, WinSCP vor 6.3.3, TortoiseGit vor 2.15.0.1 und TortoiseSVN bis 1.14.6.<\/p>\n<h2>There are fixes that need to be done<\/h2>\n<p>This vulnerability has been fixed in PuTTY 0.81 and FileZilla 3.67.0. The same applies to WinSCP 6.3.3 and TortoiseGit 2.15.0.1. TortoiseSVN users are recommended to configure the software to use Plink from the latest PuTTY 0.81 release when accessing an SVN repository over SSH until a patch is available.<\/p>\n<p>ECDSA NIST-P521 keys used with all vulnerable products\/components are considered compromised and will therefore be revoked (by removing them). PuTTY has issued <a href=\"https:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/wishlist\/vuln-p521-bias.html\" target=\"_blank\" rel=\"noopener\">this advisory<\/a> on the issue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The free software PuTTY can be used to establish connections via Secure Shell, Telnet, remote login or serial interfaces with a server. However, there is a critical vulnerability in the software in question (CVE-2024-31497) that can be used to reconstruct &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/04\/18\/kritische-putty-schwachstelle-cve-2024-31497-verrt-private-schlssel\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-33778","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33778"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33778\/revisions"}],"predecessor-version":[{"id":33780,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33778\/revisions\/33780"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}