CVE-2025-26618Memory Allocation with Excessive Size Value in OTP

Severity
7.0HIGHNVD
EPSS
0.3%
top 43.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 20
Latest updateMar 3

Description

Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed t

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

Affected Packages1 packages

CVEListV5erlang/otp< OTP-25.3.2.18+2

🔴Vulnerability Details

2
CVEList
SSH SFTP packet size not verified properly in Erlang OTP2025-02-20
OSV
CVE-2025-26618: Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability2025-02-20

📋Vendor Advisories

4
Ubuntu
Erlang vulnerability2025-03-03
Red Hat
otp: erlang: SSH SFTP packet size not verified properly in Erlang OTP2025-02-20
Microsoft
SSH SFTP packet size not verified properly in Erlang OTP2025-02-11
Debian
CVE-2025-26618: erlang - Erlang is a programming language and runtime system for building massively scala...2025
CVE-2025-26618 — Erlang OTP vulnerability | cvebase