Impact
PuTTY’s Ed25519 signature handler contains a flaw that allows the eddsa_verify function to accept malformed or tampered signatures as authentic. This undermines the integrity of authentication procedures that rely on Ed25519, potentially enabling an attacker to impersonate a legitimate user or tamper with authenticated data. The weakness is rooted in improper signature validation, aligning with CWE‑345 and CWE‑347.
Affected Systems
PuTTY version 0.83 is affected. The flaw is present in the crypto/ecc-ssh.c component and was addressed by commit af996b5ec27ab79bae3882071b9d6acf16044549, which is included in later releases. Systems running the vulnerable version without this patch remain exposed to the risk described.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate severity, and while the publicly available exploit exists, its manual description states high complexity and difficulty, with no current evidence of real‑world usage. The exploit can be launched remotely, but EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting limited large‑scale activity. Administrators should still consider the risk, particularly if PuTTY is used for critical authentication, and prioritize applying the patch promptly.
OpenCVE Enrichment