
Cloud Vulnerability DB
A community-led vulnerabilities database
PuTTY through version 0.75 was identified with a security vulnerability tracked as CVE-2021-36367. The vulnerability relates to SSH session establishment behavior where PuTTY would proceed with establishing an SSH session even without sending a substantive authentication response (NVD, Debian Security).
The vulnerability stems from PuTTY's authentication handling mechanism where it would continue establishing an SSH session without proper authentication response validation. This behavior could potentially compromise the security of the SSH session establishment process (NVD).
This vulnerability made it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt that could be used to capture credential data and utilize that data for purposes undesired by the client user (Debian LTS).
The vulnerability was addressed in subsequent versions of PuTTY. For Debian systems, fixes were provided in version 0.74-1+deb11u1 for the oldstable distribution (bullseye) and version 0.78-2+deb12u1 for the stable distribution (bookworm) (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."