Article Details
Scrape Timestamp (UTC): 2024-04-16 11:20:05.309
Source: https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html
Original Article Text
Click to Toggle View
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack. The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the discovery credited to researchers Fabian Bäumer and Marcus Brinkmann of the Ruhr University Bochum. "The effect of the vulnerability is to compromise the private key," the PuTTY project said in an advisory. "An attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key, and then forge signatures as if they were from you, allowing them to (for instance) log in to any servers you use that key for." However, in order to obtain the signatures, an attacker will have to compromise the server for which the key is used to authenticate to. In a message posted on the Open Source Software Security (oss-sec) mailing list, Bäumer described the flaw as stemming from the generation of biased ECDSA cryptographic nonces, which could enable the recovery of the private key. "The first 9 bits of each ECDSA nonce are zero," Bäumer explained. "This allows for full secret key recovery in roughly 60 signatures by using state-of-the-art techniques." "These signatures can either be harvested by a malicious server (man-in-the-middle attacks are not possible given that clients do not transmit their signature in the clear) or from any other source, e.g. signed git commits through forwarded agents." Besides impacting PuTTY, it also affects other products that incorporate a vulnerable version of the software - Following responsible disclosure, the issue has been addressed in PuTTY 0.81, FileZilla 3.67.0, WinSCP 6.3.3, and TortoiseGit 2.15.0.1. Users of TortoiseSVN are recommended to use Plink from the latest PuTTY 0.81 release when accessing an SVN repository via SSH until a patch becomes available. Specifically, it has been resolved by switching to the RFC 6979 technique for all DSA and ECDSA key types, abandoning its earlier method of deriving the nonce using a deterministic approach that, while avoiding the need for a source of high-quality randomness, was susceptible to biased nonces when using P-521. On top of that, ECDSA NIST-P521 keys used with any of the vulnerable components should be considered compromised and consequently revoked by removing them from authorized_keys files files and their equivalents in other SSH servers. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
A critical vulnerability has been identified in PuTTY versions 0.68 through 0.80, potentially allowing full recovery of private keys.
The security flaw (CVE-2024-31497) affects the ECDSA cryptographic algorithm, specifically exploiting biased nonces in key generation.
Attackers capable of obtaining several dozen signed messages and the corresponding public key can recover the private key and forge signatures.
Compromised environments include servers authenticated using the vulnerable keys, with PuTTY advising immediate key revocation and updating to patched versions.
The vulnerability was also found in other software that uses PuTTY, including FileZilla, WinSCP, and TortoiseGit, all of which have released updates fixing the issue.
Researchers recommend transitioning to the usage of RFC 6979 for generating cryptographic nonces to avoid similar vulnerabilities in the future.
All users affected are urged to update their software to the latest versions and to regenerate any potentially compromised ECDSA NIST-P521 keys.