By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Citrix warns admins to manually mitigate PuTTY SSH client bug
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Citrix warns admins to manually mitigate PuTTY SSH client bug
Tech News

Citrix warns admins to manually mitigate PuTTY SSH client bug

By admin 3 Min Read
Share
SHARE

Citrix notified customers this week to manually mitigate a PuTTY SSH client vulnerability that could allow attackers to steal a XenCenter admin’s private SSH key.

XenCenter helps manage Citrix Hypervisor environments from a Windows desktop, including deploying and monitoring virtual machines.

The security flaw (tracked as CVE-2024-31497) impacts multiple versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR, which bundle and use PuTTY to make SSH connections from XenCenter to guest VMs when clicking the “Open SSH Console” button.

Citrix says that the PuTTY third-party component has been removed starting with XenCenter 8.2.6, and any versions after 8.2.7 will no longer include it.

“An issue has been reported in versions of PuTTY prior to version 0.81; when used in conjunction with XenCenter, this issue may, in some scenarios, allow an attacker who controls a guest VM to determine the SSH private key of a XenCenter administrator who uses that key to authenticate to that guest VM while using an SSH connection,” Citrix explains in a Wednesday security advisory.

Found and reported by Fabian Bäumer and Marcus Brinkmann of Ruhr University Bochum, CVE-2024-31497 is caused by how older versions of the Windows-based PuTTY SSH client generate ECDSA nonces (temporary unique cryptographic numbers) for the NIST P-521 curve used for authentication.

Brinkmann PuTTY flaw

The company told admins who want to mitigate the vulnerability to download the latest version of PuTTY and install it in place of the version bundled with older XenCenter releases.

“Customers who do not wish to use the “Open SSH Console” functionality may remove the PuTTY component completely,” Citrix added.

“Customers who wish to maintain the existing usage of PuTTY should replace the version installed on their XenCenter system with an updated version (with a version number of at least 0.81).”

In January, CISA ordered U.S. federal agencies to patch the CVE-2023-6548 code injection and the CVE-2023-6549 buffer overflow Citrix Netscaler vulnerabilities one day after Citrix warned they were actively exploited as zero-days.

Another critical Netscaler flaw (tracked as CVE-2023-4966 and dubbed Citrix Bleed) was exploited as a zero-day by multiple hacking groups to breach government organizations and high-profile tech companies, such as Boeing, before being patched in October.

The Health Sector Cybersecurity Coordination Center (HHS’ cybersecurity team) also warned health organizations in a sector-wide alert to secure NetScaler ADC and NetScaler Gateway instances against surging ransomware attacks.

You Might Also Like

iMP Tech Mini Arcade Pro Review: A Nintendo Switch Arcade Cabinet

Defence and Security vulnerabilities critical issue for business – Ibec

Cisco Premier Provider Worldwide Status for Viatel Technology Group

Why Pet-Focused Air Purification Is Becoming a Smart-Home Essential

MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

TAGGED: Citrix, Citrix Hypervisor, Mitigation, PuTTY, Vulnerability, XenCenter
Share This Article
Facebook Twitter Copy Link
Previous Article Leverkusen set new European unbeaten record on way to EL final
Next Article Elon Musk’s Neuralink Had a Brain Implant Setback. It May Come Down to Design
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Bitcoin price consolidates near $87K as downside risk persist
Crypto
Price distortions in EU energy market must end, Portuguese minister tells Euronews
World News
US offers Ukraine a 15-year security guarantee as part of peace plan, Zelenskyy says
World News
The Best Video Game Moments Of 2025
Gaming News
Brigitte Bardot Controversy: The Truth About the Late French Actress’ Beliefs
Celebrity
Meet the ex-penny share up 109% that has topped Rolls-Royce and Nvidia in 2025
Business
Nepal to scrap 'failed' Mount Everest waste deposit scheme
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Bitcoin price consolidates near $87K as downside risk persist

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Bitcoin price consolidates near $87K as downside risk persist
December 29, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?