QID 379295

Date Published: 2024-01-31

QID 379295: Putty Terrapin Attack SSH Connection Weakening Vulnerability

PuTTY is a client program for the SSH, Telnet and Rlogin network protocols. It is integrated in multiple applications on multiple operating systems for providing SSH, Telnet, and Rlogin protocol support.

CVE-2023-48795 - The SSH transport protocol with certain OpenSSH extensions, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). Affected Version:
PuTTY version prior to v0.80

Note: We only support .msi installer.

QID Detection Logic
This QID checks the vulnerable version of PuTTY by checking the file version of file in registry and also checks in %programfiles%\PuTTY location.

Successful exploitation of this vulnerability may allow an attacker to capture credential data, and use that data for purposes that are undesired by the client user

  • CVSS V3 rated as Medium - 5.9 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to latest version PuTTY 0.80 Inorder to remediate this vulnerability.

    CVEs related to QID 379295

    Software Advisories
    Advisory ID Software Component Link
    Putty 0.80 URL Logo www.chiark.greenend.org.uk/~sgtatham/putty/changes.html