CVE-2026-4115
PuTTY vulnerability analysis and mitigation

A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as af996b5ec27ab79bae3882071b9d6acf16044549. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a patch for the affected product. However, at the moment there is no proof that this flaw might have any real-world impact.


SourceNVD

Related PuTTY vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-36367HIGH8.1
  • NixOSNixOS
  • putty
NoYesJul 09, 2021
CVE-2021-33500HIGH7.5
  • NixOSNixOS
  • putty
NoYesMay 21, 2021
CVE-2026-4115MEDIUM6.3
  • PuTTYPuTTY
  • putty
NoNoMar 22, 2026
CVE-2024-31497MEDIUM5.9
  • NixOSNixOS
  • libfilezilla
NoYesApr 15, 2024
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • cert-manager
NoYesDec 18, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management