File Transfers Gone Bad, PuTTY And Others Spilling Private Keys

Source: Bleeping Computer File Transfers Gone Bad, PuTTY And Others Spilling Private Keys

Update Your ‘Secure’ File Transfer Software

To ruin your day a new vulnerability has been found in a variety of file transfer software which will allow someone to recover your private key just by checking 60 of your public signatures.   Those signatures can be acquired from a compromised computer, or just by reading your signed Git commits.  The latter doesn’t require any special access, just patience and time.

The vulnerability applies to a variety of programs which include PuTTY, Filezilla, WinSCP, TortoiseGit and TortoiseSVN for sure, with others likely also vulnerable.  You can check the exact versions as well as the official CVE at Bleeping Computer, or just update as there is a very good chance you don’t have the latest version.   The flaw comes from the way these programs generate a temporary unique cryptographic number during connection, which is biased enough to spill your private key with enough examples.

Seeing as how these programs are not used by your average user, but by sysadmins and people transferring sensitive data, it is quite a bad one.  Here’s hoping tomorrow doesn’t bring something worse!

A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.

Video News

About The Author

Jeremy Hellstrom

Call it K7M.com, AMDMB.com, or PC Perspective, Jeremy has been hanging out and then working with the gang here for years. Apart from the front page you might find him on the BOINC Forums or possibly the Fraggin' Frogs if he has the time.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Podcasts

Archive & Timeline

Previous 12 months
Explore: All The Years!