Lucene search

K
prionPRIOn knowledge basePRION:CVE-2021-36367
HistoryJul 09, 2021 - 9:15 p.m.

Design/Logic Flaw

2021-07-0921:15:00
PRIOn knowledge base
www.prio-n.com
11

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.8%

PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CPENameOperatorVersion
puttyle0.75

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.8%