Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4115: Improper Verification of Cryptographic Signature in PuTTY

0
Medium
VulnerabilityCVE-2026-4115cvecve-2026-4115
Published: Sun Mar 22 2026 (03/22/2026, 12:15:07 UTC)
Source: CVE Database V5
Product: PuTTY

Description

CVE-2026-4115 is a medium-severity vulnerability in PuTTY version 0. 83 involving improper verification of Ed25519 cryptographic signatures in the eddsa_verify function. This flaw could allow a remote attacker to bypass signature verification, potentially undermining the integrity of SSH connections. Exploitation is considered difficult due to the high complexity and no user interaction or privileges are required. Although a public exploit exists, there is currently no evidence of real-world impact. The vendor responded promptly and released a patch to address the issue. Organizations using PuTTY 0. 83 should apply the patch to mitigate risks. The vulnerability primarily affects systems relying on PuTTY for secure remote access, with significant exposure in countries where PuTTY is widely used. Given the medium CVSS score of 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 20:11:09 UTC

Technical Analysis

CVE-2026-4115 identifies a cryptographic signature verification vulnerability in PuTTY version 0.83, specifically within the eddsa_verify function of the Ed25519 Signature Handler (crypto/ecc-ssh.c). The vulnerability arises from improper verification of Ed25519 signatures, which are used to authenticate SSH connections. An attacker exploiting this flaw could potentially bypass signature verification, allowing them to impersonate legitimate SSH servers or clients, thereby compromising the integrity of the SSH session. The attack vector is remote network access, requiring no privileges or user interaction, but the complexity of crafting a successful exploit is high. The vulnerability was publicly disclosed with a patch available (commit af996b5ec27ab79bae3882071b9d6acf16044549). Despite the availability of a public exploit, there is no confirmed evidence of exploitation in the wild or real-world impact. The vendor's quick response and patch release demonstrate responsible vulnerability management. The CVSS v4.0 base score is 6.3 (medium severity), reflecting network attack vector, high complexity, no privileges or user interaction required, and limited impact on integrity. This vulnerability affects PuTTY 0.83, a widely used SSH client and server software, making it relevant for many organizations relying on secure remote access.

Potential Impact

The primary impact of CVE-2026-4115 is on the integrity of SSH connections established using PuTTY 0.83. If exploited, an attacker could bypass cryptographic signature verification, potentially allowing man-in-the-middle attacks or unauthorized access by impersonating legitimate SSH endpoints. This could lead to unauthorized command execution, data interception, or session hijacking. However, the difficulty of exploitation and lack of evidence of active exploitation reduce the immediate risk. Organizations using PuTTY for critical infrastructure management, cloud environments, or secure remote administration could face significant operational and security risks if this vulnerability is exploited. The confidentiality and availability impacts are minimal or none, as the vulnerability specifically targets signature verification integrity. The medium CVSS score reflects a moderate threat level, emphasizing the need for patching but indicating that the vulnerability is not trivially exploitable or devastating on its own.

Mitigation Recommendations

1. Immediately apply the official patch released by the PuTTY maintainers (commit af996b5ec27ab79bae3882071b9d6acf16044549) to PuTTY version 0.83 or upgrade to a later, patched version. 2. Verify the integrity and authenticity of PuTTY binaries before deployment to prevent use of tampered versions. 3. Employ network-level protections such as SSH bastion hosts and strict firewall rules to limit exposure of SSH services. 4. Monitor SSH logs for unusual connection attempts or anomalies that could indicate exploitation attempts. 5. Use multi-factor authentication and key-based authentication to reduce the impact of potential signature verification bypasses. 6. Conduct regular security audits and vulnerability assessments on SSH infrastructure to detect and remediate related weaknesses. 7. Educate system administrators about the vulnerability and ensure timely patch management practices. 8. Consider deploying intrusion detection/prevention systems capable of identifying suspicious SSH traffic patterns related to signature manipulation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-13T12:09:58.769Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bfe0fbf4197a8e3b712c00

Added to database: 3/22/2026, 12:30:51 PM

Last enriched: 3/29/2026, 8:11:09 PM

Last updated: 5/7/2026, 4:54:33 AM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses