CVE [CVE-2021-36367] Putty - spoofed authentication prompt (that the attacker can use to capture credential data)

Common Vulnerabilities and Exposures

Marks-Man

Administrator
Joined: Mar 15, 2021
Messages: 373
Resources: 213
Points: 28
Reaction score: 96
PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user).

CVSS Scores & Vulnerability Types​

CVSS Score5.8
Confidentiality ImpactPartial (There is considerable informational disclosure.)
Integrity ImpactPartial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability ImpactNone (There is no impact to the availability of the system.)
Access ComplexityMedium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
AuthenticationNot required (Authentication is not required to exploit the vulnerability.)
Gained AccessNone
Vulnerability Type(s)
CWE ID345

- Products Affected By CVE-2021-36367​

#Product TypeVendorProductVersionUpdateEditionLanguage
1ApplicationPuttyPutty****Version Details Vulnerabilities

- Number Of Affected Versions By Product​

VendorProductVulnerable Versions
PuttyPutty1

- References For CVE-2021-36367​

- Metasploit Modules Related To CVE-2021-36367​

There are not any metasploit modules related
 
  • Tags
    putty spoofed authentication prompt
  • Top