Summary
A vulnerability in PuTTY could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.
Products not listed in the Impact Details section have not been evaluated. Furthermore, products that have exceeded any software maintenance time periods are also not evaluated and will not be published. Please consult End of Sale and End of Service Life - Extreme Networks for the EOL notices related to the product under question.
Impact Details
OS/Product |
Exposure |
ExtremeCloud IQ - Site Engine (XIQ-SE) |
No |
ExtremeControl for Site Engine |
No |
Fabric Engine (VOSS) |
No |
WiNG |
No |
Repair Recommendations
None
Please see the full Security Advisory article here for more details and updates.