Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23749: n/a in n/a

0
High
VulnerabilityCVE-2024-23749cvecve-2024-23749
Published: Fri Feb 09 2024 (02/09/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:27:49 UTC

Technical Analysis

CVE-2024-23749 is a high-severity command injection vulnerability affecting KiTTY versions 0.76.1.13 and earlier. KiTTY is a fork of the popular SSH and Telnet client PuTTY, widely used for remote access and management of networked systems. The vulnerability arises due to insufficient input sanitization and validation of the filename variable, specifically within code lines 2369-2390. The application fails to properly escape special characters and uses insecure system calls, allowing an attacker to inject arbitrary commands through crafted input in the filename parameter. Successful exploitation enables arbitrary code execution with the privileges of the user running KiTTY. The CVSS 3.1 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, requiring low privileges and no user interaction but local access (AV:L, PR:L, UI:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution and system compromise. The underlying weakness corresponds to CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')).

Potential Impact

For European organizations, this vulnerability could lead to severe consequences if exploited. KiTTY is commonly used by IT administrators and security professionals for managing remote servers and network devices. Arbitrary code execution could allow attackers to gain unauthorized access, escalate privileges, deploy malware, exfiltrate sensitive data, or disrupt critical services. Given the high confidentiality, integrity, and availability impacts, exploitation could compromise sensitive corporate or governmental infrastructure. The local attack vector means that attackers would need some level of access to the victim system, such as through phishing, insider threat, or lateral movement after initial compromise. However, once local access is achieved, the vulnerability could facilitate full system takeover. This risk is particularly acute for organizations relying on KiTTY for secure remote management, including financial institutions, critical infrastructure operators, and government agencies across Europe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade KiTTY to a version that addresses CVE-2024-23749 once available. In the absence of an official patch, users should avoid using vulnerable versions and consider alternative SSH clients with robust security. Restrict local access to systems running KiTTY by enforcing strict access controls, multi-factor authentication, and endpoint security measures to prevent unauthorized local logins. Implement application whitelisting and behavior monitoring to detect anomalous command execution. Network segmentation can limit lateral movement if compromise occurs. Additionally, administrators should audit scripts and automation that use KiTTY to ensure no untrusted input is passed to the filename variable. Security teams should monitor for indicators of compromise related to command injection attempts and maintain up-to-date threat intelligence. Finally, educating users about the risks of local code execution vulnerabilities and enforcing the principle of least privilege will reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3cb

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:27:49 AM

Last updated: 12/5/2025, 2:08:40 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats