The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-31497

CVE-2024-31497: PuTTY ECDSA Information Disclosure Flaw

CVE-2024-31497 is an information disclosure vulnerability in PuTTY that exposes NIST P-521 private keys through biased ECDSA nonce generation. This article covers technical details, affected versions, and mitigation strategies.

Published: January 28, 2026

CVE-2024-31497 Overview

CVE-2024-31497 is a cryptographic vulnerability affecting PuTTY versions 0.68 through 0.80 that allows an attacker to recover a user's NIST P-521 secret key through biased ECDSA nonce generation. The vulnerability enables key recovery with approximately 60 signatures, making it particularly dangerous in scenarios where signed messages are publicly accessible, such as Git commit signatures stored in public repositories.

This vulnerability poses significant risks in two primary attack scenarios. First, adversaries may already possess sufficient signature information from public Git services that support SSH commit signing, especially when signatures were made through Pageant's agent-forwarding mechanism. Second, a malicious SSH server operator could derive a victim's private key during authentication, then use it for unauthorized access to other services where the same key is used.

Critical Impact

Private key compromise enables supply-chain attacks on software maintained in Git repositories and unauthorized access to SSH-authenticated services.

Affected Products

  • PuTTY versions 0.68 through 0.80
  • FileZilla Client before version 3.67.0
  • WinSCP before version 6.3.3
  • TortoiseGit before version 2.15.0.1
  • TortoiseSVN through version 1.14.6
  • Fedora 38, 39, and 40

Discovery Timeline

  • April 15, 2024 - CVE-2024-31497 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2024-31497

Vulnerability Analysis

The vulnerability stems from a fundamental flaw in how PuTTY generates ECDSA nonces when signing with NIST P-521 keys. ECDSA signatures require a cryptographically secure random nonce for each signature operation. When the nonce generation exhibits statistical bias, as is the case with CVE-2024-31497, attackers can apply lattice-based cryptographic attacks to recover the private key.

The biased nonce generation in PuTTY's implementation allows an attacker who can observe approximately 60 ECDSA signatures to mathematically derive the private key. This is particularly concerning because the signatures themselves are not secret—they are transmitted as part of normal SSH authentication and Git commit signing operations.

The attack is feasible even for past signatures. If a user has been using vulnerable PuTTY versions with NIST P-521 keys for SSH authentication to public Git services or any server where signatures were captured, those historical signatures may be sufficient for key recovery without any further interaction with the victim.

Root Cause

The root cause of CVE-2024-31497 is classified as CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator). PuTTY's ECDSA nonce generation for P-521 curves introduced a statistical bias that reduces the effective entropy of the nonces. When nonces are not uniformly distributed across the expected range, each signature leaks partial information about the private key.

The cryptographic principle being violated is that ECDSA security relies on nonces being indistinguishable from random values across the full range. The bias in PuTTY's implementation creates a mathematical relationship between multiple signatures that can be exploited using Lenstra–Lenstra–Lovász (LLL) lattice reduction algorithms.

Attack Vector

The attack can be executed remotely by any adversary who can collect sufficient ECDSA signatures made with the victim's NIST P-521 key. There are multiple collection vectors:

Public Git Services: Signatures for Git commits are publicly visible on platforms like GitHub when SSH signing is used. An attacker can passively collect these signatures from any public repository where the victim has committed code.

Malicious SSH Server: An attacker operating an SSH server (even one the victim intentionally connects to) can collect authentication signatures. This is particularly dangerous when users employ the same key across multiple services.

Agent Forwarding Interception: When Pageant's agent-forwarding mechanism is used, intermediate servers can observe signatures, creating additional exposure points.

Once approximately 60 signatures are collected, the attacker applies lattice reduction techniques to solve for the private key. A proof-of-concept exploit is available at the CVE-2024-31497 PoC Repository, and additional technical analysis of ECDSA lattice attacks can be found at the ECDSA Break Analysis Repository.

Detection Methods for CVE-2024-31497

Indicators of Compromise

  • NIST P-521 SSH keys used with PuTTY versions 0.68-0.80, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, or TortoiseSVN through 1.14.6
  • Unauthorized access to systems using SSH authentication where the victim's P-521 key was previously used
  • Unexpected Git commits signed with the victim's key appearing in repositories
  • Authentication logs showing access from unfamiliar IP addresses using legitimate P-521 keys

Detection Strategies

  • Audit SSH key inventory to identify any NIST P-521 keys that may have been used with vulnerable software versions
  • Review Git commit histories on public repositories for signatures made with potentially compromised keys
  • Monitor authentication logs for SSH connections using P-521 keys from unexpected sources or geolocations
  • Implement alerting for any new SSH key usage patterns that deviate from established baselines

Monitoring Recommendations

  • Enable verbose SSH logging on critical servers to capture key fingerprints and signature details for forensic analysis
  • Deploy endpoint detection solutions to identify vulnerable PuTTY, FileZilla, WinSCP, TortoiseGit, and TortoiseSVN versions across the enterprise
  • Monitor Git platforms for commit signing activity and correlate with known vulnerable client usage
  • Implement network monitoring to detect SSH connections to unusual destinations that could indicate key compromise testing

How to Mitigate CVE-2024-31497

Immediate Actions Required

  • Immediately upgrade PuTTY to version 0.81 or later, which contains the fix for the biased nonce generation
  • Update all affected software: FileZilla to 3.67.0+, WinSCP to 6.3.3+, TortoiseGit to 2.15.0.1+
  • Assume any NIST P-521 keys used with vulnerable versions are compromised and should be rotated
  • Revoke and regenerate affected SSH keys, then update authorized_keys files on all servers
  • Consider switching to Ed25519 keys, which are not affected by this vulnerability

Patch Information

PuTTY version 0.81 addresses this vulnerability by correcting the ECDSA nonce generation for P-521 curves. The patch details are available in the PuTTY source repository and the PuTTY changelog. The official vulnerability advisory is documented in the PuTTY wishlist.

For Fedora users, updated packages are available through the standard package management system. Debian users should refer to the Debian LTS Announcement for patch availability.

Workarounds

  • If immediate patching is not possible, discontinue use of NIST P-521 keys and switch to Ed25519 or RSA keys
  • Avoid using Pageant agent forwarding until the software is updated
  • Restrict SSH authentication to trusted servers only and avoid connecting to untrusted SSH endpoints
  • Remove any P-521 public keys from authorized_keys files on critical systems until key rotation is complete
bash
# Identify and rotate P-521 keys
# List all SSH keys to identify P-521 keys that need rotation
ssh-keygen -l -f ~/.ssh/id_ecdsa

# Generate a new Ed25519 key as a replacement (recommended)
ssh-keygen -t ed25519 -C "replacement-key@example.com"

# Update authorized_keys on remote servers
ssh-copy-id -i ~/.ssh/id_ed25519.pub user@remote-server

# Remove old P-521 key from remote servers
ssh user@remote-server "sed -i '/ecdsa-sha2-nistp521.*compromised-key/d' ~/.ssh/authorized_keys"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechPutty

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability17.57%

  • Known ExploitedYes
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-338
  • Technical References
  • Openwall Security Updates

  • Red Hat Bugzilla Report

  • SUSE Bugzilla Report

  • Brown University SSH Guide

  • FileZilla Version History

  • GitHub Security Advisory

  • GitHub ECDSA Break Analysis

  • Debian LTS Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Hacker News Discussion

  • Debian CVE Tracker for CVE-2024-31497

  • Security Online CVE-2024-31497 Alert

  • Tartarus Putty Documentation

  • TortoiseGit Homepage

  • Twitter CCB Alert

  • Twitter Lambdafu Post

  • WinSCP News

  • BleepingComputer Putty Flaw Report

  • Openwall Security Updates

  • Reddit Sysadmin Discussion

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Vicarius Analysis of CVE-2024-31497
  • Vendor Resources
  • Tartarus Git Putty Repository

  • Chiark Putty Changes

  • Chiark Putty Wishlist Item
  • Related CVEs
  • CVE-2026-4115: PuTTY Ed25519 Signature RCE Vulnerability

  • CVE-2021-36367: PuTTY Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English