QID 379295
Date Published: 2024-01-31
QID 379295: Putty Terrapin Attack SSH Connection Weakening Vulnerability
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols. It is integrated in multiple applications on multiple operating systems for providing SSH, Telnet, and Rlogin protocol support.
CVE-2023-48795 - The SSH transport protocol with certain OpenSSH extensions, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC).
Affected Version:
PuTTY version prior to v0.80
Note: We only support .msi installer.
QID Detection Logic
This QID checks the vulnerable version of PuTTY by checking the file version of file in registry and also checks in %programfiles%\PuTTY location.
Successful exploitation of this vulnerability may allow an attacker to capture credential data, and use that data for purposes that are undesired by the client user
CVEs related to QID 379295
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Putty 0.80 |
|