Skip to main content

CVE-2024-23749: n/a in n/a

High
VulnerabilityCVE-2024-23749cvecve-2024-23749
Published: Fri Feb 09 2024 (02/09/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:27:49 UTC

Technical Analysis

CVE-2024-23749 is a high-severity command injection vulnerability affecting KiTTY versions 0.76.1.13 and earlier. KiTTY is a fork of the popular SSH and Telnet client PuTTY, widely used for remote access and management of networked systems. The vulnerability arises due to insufficient input sanitization and validation of the filename variable, specifically within code lines 2369-2390. The application fails to properly escape special characters and uses insecure system calls, allowing an attacker to inject arbitrary commands through crafted input in the filename parameter. Successful exploitation enables arbitrary code execution with the privileges of the user running KiTTY. The CVSS 3.1 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, requiring low privileges and no user interaction but local access (AV:L, PR:L, UI:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution and system compromise. The underlying weakness corresponds to CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')).

Potential Impact

For European organizations, this vulnerability could lead to severe consequences if exploited. KiTTY is commonly used by IT administrators and security professionals for managing remote servers and network devices. Arbitrary code execution could allow attackers to gain unauthorized access, escalate privileges, deploy malware, exfiltrate sensitive data, or disrupt critical services. Given the high confidentiality, integrity, and availability impacts, exploitation could compromise sensitive corporate or governmental infrastructure. The local attack vector means that attackers would need some level of access to the victim system, such as through phishing, insider threat, or lateral movement after initial compromise. However, once local access is achieved, the vulnerability could facilitate full system takeover. This risk is particularly acute for organizations relying on KiTTY for secure remote management, including financial institutions, critical infrastructure operators, and government agencies across Europe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade KiTTY to a version that addresses CVE-2024-23749 once available. In the absence of an official patch, users should avoid using vulnerable versions and consider alternative SSH clients with robust security. Restrict local access to systems running KiTTY by enforcing strict access controls, multi-factor authentication, and endpoint security measures to prevent unauthorized local logins. Implement application whitelisting and behavior monitoring to detect anomalous command execution. Network segmentation can limit lateral movement if compromise occurs. Additionally, administrators should audit scripts and automation that use KiTTY to ensure no untrusted input is passed to the filename variable. Security teams should monitor for indicators of compromise related to command injection attempts and maintain up-to-date threat intelligence. Finally, educating users about the risks of local code execution vulnerabilities and enforcing the principle of least privilege will reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3cb

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:27:49 AM

Last updated: 8/15/2025, 1:02:23 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats