AI Score
Confidence
Low
EPSS
Percentile
51.7%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).
[
{
"cpes": [
"cpe:2.3:a:putty:putty:-:*:*:*:*:*:*:*"
],
"vendor": "putty",
"product": "putty",
"versions": [
{
"status": "affected",
"version": "-",
"versionType": "custom",
"lessThanOrEqual": "0.75"
}
],
"defaultStatus": "unknown"
}
]