CVE [CVE-2021-36367] Putty - spoofed authentication prompt (that the attacker can use to capture credential data)

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS Scores & Vulnerability Types​

CVSS Score5.8
Confidentiality ImpactPartial (There is considerable informational disclosure.)
Integrity ImpactPartial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability ImpactNone (There is no impact to the availability of the system.)
Access ComplexityMedium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
AuthenticationNot required (Authentication is not required to exploit the vulnerability.)
Gained AccessNone
Vulnerability Type(s)
CWE ID345

- Products Affected By CVE-2021-36367​

#Product TypeVendorProductVersionUpdateEditionLanguage
1ApplicationPuttyPutty****

Continue reading...
 
Top