PuTTY SSH client versions 0.68 through 0.80 are vulnerable to a key recovery attack, allowing attackers to obtain private keys and forge signatures. The flaw is attributed to biased ECDSA nonces and impacts other products like FileZilla, WinSCP, TortoiseGit, and TortoiseSVN. The issue has been addressed in the latest releases of PuTTY, FileZilla, WinSCP, and TortoiseGit.

2m read timeFrom thehackernews.com
Post cover image

Sort: