Products > Security

Putty/FileZilla - Keygen Vuln

(1/1)

bingo600:
Not likely to be  a "bad one" , unless you are commting to git etc. with Putty.
But do update your Putty, FileZilla etc ...



https://www.cvedetails.com/cve/CVE-2024-31497/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31497

All NIST P-521 client keys used with PuTTY must be considered compromised, given that the attack can be carried out even after the root cause has been fixed in the source code (assuming that ~60 pre-patch signatures are available to an adversary).

### Mitigations

This vulnerability has been fixed in PuTTY 0.81, FileZilla 3.67.0, WinSCP 6.3.3, and TortoiseGit 2.15.0.1. Users of TortoiseSVN are advised to configure TortoiseSVN to use Plink from the latest PuTTY 0.81 release when accessing a SVN repository via SSH until a patch becomes available.

Halcyon:
Revoke and regenerate keys on the server end as well.

Navigation

[0] Message Index

There was an error while thanking
Thanking...
Go to full version
Powered by SMFPacks Advanced Attachments Uploader Mod