Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4115: Improper Verification of Cryptographic Signature in PuTTY

0
Medium
VulnerabilityCVE-2026-4115cvecve-2026-4115
Published: Sun Mar 22 2026 (03/22/2026, 12:15:07 UTC)
Source: CVE Database V5
Product: PuTTY

Description

A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as af996b5ec27ab79bae3882071b9d6acf16044549. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a patch for the affected product. However, at the moment there is no proof that this flaw might have any real-world impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 12:45:55 UTC

Technical Analysis

CVE-2026-4115 identifies a cryptographic signature verification vulnerability in PuTTY version 0.83, specifically within the eddsa_verify function of the Ed25519 Signature Handler located in crypto/ecc-ssh.c. The vulnerability arises from improper verification of Ed25519 signatures, which could allow an attacker to bypass or weaken authentication mechanisms. The flaw impacts the integrity of the cryptographic process, potentially enabling unauthorized access if exploited. The attack vector is remote network-based, requiring no privileges or user interaction, but the complexity to exploit is high, making practical exploitation challenging. The vulnerability was responsibly disclosed, and the PuTTY maintainers responded quickly by releasing a patch identified by commit af996b5ec27ab79bae3882071b9d6acf16044549. Despite the availability of a public exploit, there is no confirmed evidence of exploitation in the wild or significant real-world impact. The CVSS 4.0 base score of 6.3 reflects a medium severity level, considering the attack complexity and limited impact on confidentiality, integrity, and availability. The vulnerability specifically affects PuTTY 0.83, a widely used SSH client, particularly in environments where Ed25519 keys are employed for authentication.

Potential Impact

If exploited, this vulnerability could allow an attacker to bypass or weaken the authentication process in SSH sessions established via PuTTY 0.83 using Ed25519 keys. This could lead to unauthorized access to systems, potentially compromising confidentiality and integrity of data transmitted over SSH. However, the high complexity of exploitation and lack of privileges or user interaction required reduce the likelihood of widespread attacks. The absence of confirmed real-world exploitation further limits immediate impact. Organizations relying heavily on PuTTY for secure remote access, especially those using Ed25519 keys, are at risk of unauthorized access attempts. Compromise could lead to lateral movement within networks, data exfiltration, or disruption of operations. The vulnerability does not affect availability directly but undermines trust in cryptographic authentication, which is critical for secure communications.

Mitigation Recommendations

Organizations should promptly apply the official patch released by the PuTTY maintainers (commit af996b5ec27ab79bae3882071b9d6acf16044549) to remediate the vulnerability. Until patched, administrators should consider restricting SSH access to trusted networks and users, implementing network-level controls such as IP whitelisting and multi-factor authentication to reduce exposure. Monitoring SSH logs for unusual authentication attempts or anomalies related to Ed25519 key usage can help detect potential exploitation attempts. Where feasible, temporarily disabling Ed25519 key usage or switching to alternative key types (e.g., RSA or ECDSA) may reduce risk. Regularly updating PuTTY and other SSH clients to the latest versions ensures protection against known vulnerabilities. Security teams should also educate users about the importance of applying updates promptly and maintaining strong authentication practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-13T12:09:58.769Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bfe0fbf4197a8e3b712c00

Added to database: 3/22/2026, 12:30:51 PM

Last enriched: 3/22/2026, 12:45:55 PM

Last updated: 3/22/2026, 1:32:22 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses