CVE-2019-9898
📋 TL;DR
PuTTY versions before 0.71 have a cryptographic vulnerability where random numbers used for SSH session keys could be recycled, potentially allowing attackers to decrypt SSH sessions or perform man-in-the-middle attacks. This affects all users of vulnerable PuTTY versions for SSH connections.
💻 Affected Systems
- PuTTY
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Putty by Putty
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of SSH sessions allowing decryption of all traffic, credential theft, and man-in-the-middle attacks against SSH connections.
Likely Case
Session hijacking and decryption of sensitive data transmitted over SSH, particularly in targeted attacks.
If Mitigated
Limited impact if using additional encryption layers or network segmentation, but SSH security is fundamentally compromised.
🎯 Exploit Status
Exploitation requires the attacker to be in a position to intercept or manipulate SSH traffic. Proof of concept exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.71 and later
Vendor Advisory: https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Restart Required: No
Instructions:
1. Download PuTTY 0.71 or later from official website. 2. Uninstall old version. 3. Install new version. 4. Verify version with 'putty -V' command.
🔧 Temporary Workarounds
Use alternative SSH clients
allTemporarily switch to other SSH clients like OpenSSH, SecureCRT, or Bitvise SSH Client until PuTTY is patched.
Network segmentation
allRestrict SSH traffic to trusted networks only and implement network monitoring for unusual SSH patterns.
🧯 If You Can't Patch
- Implement strict network access controls to limit SSH connections to essential systems only
- Deploy network monitoring and IDS/IPS systems to detect potential SSH session manipulation attempts
🔍 How to Verify
Check if Vulnerable:
Run 'putty -V' command and check if version is earlier than 0.71. On Windows, check Help → About in PuTTY GUI.
Check Version:
putty -V
Verify Fix Applied:
After updating, run 'putty -V' and confirm version is 0.71 or higher. Verify checksum of downloaded installer matches official release.
📡 Detection & Monitoring
Log Indicators:
- Unusual SSH connection patterns
- Multiple failed SSH connections from same source
- SSH session resets or anomalies
Network Indicators:
- Unusual SSH traffic patterns
- SSH protocol anomalies
- Man-in-the-middle attack signatures
SIEM Query:
source="ssh_logs" AND (event="session_key_error" OR event="crypto_failure" OR pattern="unusual_ssh_handshake")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00020.html
- http://www.securityfocus.com/bid/107523
- https://lists.debian.org/debian-lts-announce/2019/04/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36LWQ3NPFIV7DC7TC4KFPRYRH2OR7SZ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDO3F267P347E6U2IILFCYW7JPTLCCES/
- https://seclists.org/bugtraq/2019/Apr/6
- https://security.netapp.com/advisory/ntap-20190329-0002/
- https://security.netapp.com/advisory/ntap-20190401-0002/
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://www.debian.org/security/2019/dsa-4423
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00020.html
- http://www.securityfocus.com/bid/107523
- https://lists.debian.org/debian-lts-announce/2019/04/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36LWQ3NPFIV7DC7TC4KFPRYRH2OR7SZ2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDO3F267P347E6U2IILFCYW7JPTLCCES/
- https://seclists.org/bugtraq/2019/Apr/6
- https://security.netapp.com/advisory/ntap-20190329-0002/
- https://security.netapp.com/advisory/ntap-20190401-0002/
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://www.debian.org/security/2019/dsa-4423