[CVE-2021-36367] Putty - spoofed authentication prompt (that the attacker can use to capture credential data)

XMAN

Active member
Joined
Jul 12, 2021
Messages
19,124
Reaction score
2
Points
38
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS Scores & Vulnerability Types​

CVSS Score5.8
Confidentiality ImpactPartial (There is considerable informational disclosure.)
Integrity ImpactPartial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability ImpactNone (There is no impact to the availability of the system.)
Access ComplexityMedium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
AuthenticationNot required (Authentication is not required to exploit the vulnerability.)
Gained AccessNone
Vulnerability Type(s)
CWE ID
Please Login or Register to view content

- Products Affected By CVE-2021-36367​

#Product TypeVendorProductVersionUpdateEditionLanguage
1Application
Please Login or Register to view content
Please Login or Register to view content
****

Please Login or Register to view content
 
Top