CVE-2024-31497: n/a
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.
AI Analysis
Technical Summary
CVE-2024-31497 is a cryptographic vulnerability found in PuTTY versions 0.68 through 0.80 prior to 0.81, as well as in related software such as FileZilla, WinSCP, TortoiseGit, and TortoiseSVN. The core issue lies in biased nonce generation during ECDSA signing using the NIST P-521 curve. ECDSA requires a fresh, uniformly random nonce for each signature; bias or reuse of this nonce can leak the private key. In this case, the nonce bias allows an attacker to recover the victim's private key after collecting approximately 60 signatures. The attack scenarios include: (1) an adversary accessing signed messages publicly available in Git repositories where commit signing is used, especially when signatures are generated via Pageant with agent forwarding; (2) a malicious SSH server operator to which the victim connects using the same private key, enabling the attacker to derive the private key from signatures generated during authentication. Once the private key is compromised, the attacker can impersonate the victim, gain unauthorized access to other services using the same key, and potentially conduct supply-chain attacks by injecting malicious code into software repositories. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator) and has a CVSS v3.1 score of 5.9, indicating medium severity. The attack vector is network-based with high attack complexity, no privileges or user interaction required, and impacts confidentiality but not integrity or availability. The vulnerability affects a broad range of widely used SSH and file transfer clients, making it a significant risk for environments relying on these tools for secure communications and code signing.
Potential Impact
For European organizations, the impact of CVE-2024-31497 is considerable due to the widespread use of PuTTY and related clients in enterprise environments for SSH access, file transfers, and Git commit signing. The ability to recover private keys compromises the confidentiality of authentication credentials and code signing keys, enabling attackers to impersonate users and inject malicious code into software supply chains. This can lead to unauthorized access to critical infrastructure, intellectual property theft, and disruption of software development pipelines. Organizations with public or semi-public Git repositories are particularly vulnerable, as attackers may harvest signatures without direct network access. The risk is amplified in environments where private keys are reused across multiple services, increasing the attack surface. Supply-chain attacks facilitated by this vulnerability could have cascading effects on software integrity and trustworthiness across European industries, including finance, manufacturing, and government sectors. Additionally, the involvement of SSH agent forwarding in the attack vector highlights risks in remote work and cloud-based development workflows common in Europe. Although the CVSS score is medium, the potential for key compromise and subsequent unauthorized access elevates the threat's seriousness for organizations relying heavily on these tools.
Mitigation Recommendations
To mitigate CVE-2024-31497, European organizations should immediately update all affected software to versions that have patched the biased nonce generation issue: PuTTY 0.81 or later, FileZilla 3.67.0 or later, WinSCP 6.3.3 or later, TortoiseGit 2.15.0.1 or later, and TortoiseSVN versions beyond 1.14.6. Organizations should audit their use of NIST P-521 ECDSA keys, especially those used for SSH authentication and Git commit signing, and consider generating new keys with secure nonce generation. Avoid reusing the same private key across multiple services to limit the impact of a potential compromise. Disable SSH agent forwarding where not strictly necessary, or restrict it to trusted servers only, to reduce exposure to rogue SSH servers. Review and restrict access to signed messages stored in public or semi-public repositories to minimize signature leakage. Implement monitoring for unusual SSH authentication patterns and unauthorized Git commits that could indicate key compromise. Educate developers and system administrators about the risks of key reuse and the importance of timely patching. Finally, consider adopting alternative cryptographic algorithms or key types less susceptible to nonce-related vulnerabilities, such as Ed25519, where feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-31497: n/a
Description
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.
AI-Powered Analysis
Technical Analysis
CVE-2024-31497 is a cryptographic vulnerability found in PuTTY versions 0.68 through 0.80 prior to 0.81, as well as in related software such as FileZilla, WinSCP, TortoiseGit, and TortoiseSVN. The core issue lies in biased nonce generation during ECDSA signing using the NIST P-521 curve. ECDSA requires a fresh, uniformly random nonce for each signature; bias or reuse of this nonce can leak the private key. In this case, the nonce bias allows an attacker to recover the victim's private key after collecting approximately 60 signatures. The attack scenarios include: (1) an adversary accessing signed messages publicly available in Git repositories where commit signing is used, especially when signatures are generated via Pageant with agent forwarding; (2) a malicious SSH server operator to which the victim connects using the same private key, enabling the attacker to derive the private key from signatures generated during authentication. Once the private key is compromised, the attacker can impersonate the victim, gain unauthorized access to other services using the same key, and potentially conduct supply-chain attacks by injecting malicious code into software repositories. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator) and has a CVSS v3.1 score of 5.9, indicating medium severity. The attack vector is network-based with high attack complexity, no privileges or user interaction required, and impacts confidentiality but not integrity or availability. The vulnerability affects a broad range of widely used SSH and file transfer clients, making it a significant risk for environments relying on these tools for secure communications and code signing.
Potential Impact
For European organizations, the impact of CVE-2024-31497 is considerable due to the widespread use of PuTTY and related clients in enterprise environments for SSH access, file transfers, and Git commit signing. The ability to recover private keys compromises the confidentiality of authentication credentials and code signing keys, enabling attackers to impersonate users and inject malicious code into software supply chains. This can lead to unauthorized access to critical infrastructure, intellectual property theft, and disruption of software development pipelines. Organizations with public or semi-public Git repositories are particularly vulnerable, as attackers may harvest signatures without direct network access. The risk is amplified in environments where private keys are reused across multiple services, increasing the attack surface. Supply-chain attacks facilitated by this vulnerability could have cascading effects on software integrity and trustworthiness across European industries, including finance, manufacturing, and government sectors. Additionally, the involvement of SSH agent forwarding in the attack vector highlights risks in remote work and cloud-based development workflows common in Europe. Although the CVSS score is medium, the potential for key compromise and subsequent unauthorized access elevates the threat's seriousness for organizations relying heavily on these tools.
Mitigation Recommendations
To mitigate CVE-2024-31497, European organizations should immediately update all affected software to versions that have patched the biased nonce generation issue: PuTTY 0.81 or later, FileZilla 3.67.0 or later, WinSCP 6.3.3 or later, TortoiseGit 2.15.0.1 or later, and TortoiseSVN versions beyond 1.14.6. Organizations should audit their use of NIST P-521 ECDSA keys, especially those used for SSH authentication and Git commit signing, and consider generating new keys with secure nonce generation. Avoid reusing the same private key across multiple services to limit the impact of a potential compromise. Disable SSH agent forwarding where not strictly necessary, or restrict it to trusted servers only, to reduce exposure to rogue SSH servers. Review and restrict access to signed messages stored in public or semi-public repositories to minimize signature leakage. Implement monitoring for unusual SSH authentication patterns and unauthorized Git commits that could indicate key compromise. Educate developers and system administrators about the risks of key reuse and the importance of timely patching. Finally, consider adopting alternative cryptographic algorithms or key types less susceptible to nonce-related vulnerabilities, such as Ed25519, where feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b4cff58c9332ff06e7c
Added to database: 11/4/2025, 5:43:40 PM
Last enriched: 11/11/2025, 6:29:34 PM
Last updated: 12/15/2025, 4:18:30 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumCVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.