CVE-2024-31497Use of Cryptographically Weak Pseudo-Random Number Generator in Filezilla Client

Severity
5.9MEDIUMNVD
EPSS
19.2%
top 4.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15
Latest updateSep 11

Description

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through a

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages7 packages

NVDputty/putty0.680.81
Debianputty/putty< 0.74-1+deb11u2+3
Debianfilezilla/filezilla< 3.67.0-1+1
NVDwinscp/winscp< 6.3.3

Also affects: Fedora 38, 39, 40

Patches

🔴Vulnerability Details

3
OSV
CVE-2024-31497: In PuTTY 02024-04-15
GHSA
GHSA-6p4c-r453-8743: In PuTTY 02024-04-15
CVEList
CVE-2024-31497: In PuTTY 02024-04-15

📋Vendor Advisories

1
Debian
CVE-2024-31497: filezilla - In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an ...2024

🕵️Threat Intelligence

5
Bleepingcomputer
Citrix warns admins to manually mitigate PuTTY SSH client bug2024-05-09
Bleepingcomputer
PuTTY SSH client flaw allows recovery of cryptographic private keys2024-04-16
Wiz
CVE-2026-4115 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2023-53959 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2019-25683 Impact, Exploitability, and Mitigation Steps | Wiz

📄Research Papers

1
arXiv
On the Security of SSH Client Signatures2025-09-11
CVE-2024-31497 — Filezilla Client vulnerability | cvebase