Erlang Otp vulnerabilities

12 known vulnerabilities affecting erlang/erlang_otp.

Total CVEs
12
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH5MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2025-32433CRITICALCVSS 10.0KEVPoCfixed in 25.3.2.20≥ 26.0, < 26.2.5.11+1 more2025-04-16
CVE-2025-32433 [CRITICAL] CWE-306 CVE-2025-32433: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems a
nvdosv
CVE-2023-48795MEDIUMCVSS 5.9PoCfixed in 22.3.4.27≥ 23.0, < 23.3.4.20+3 more2023-12-18
CVE-2023-48795 [MEDIUM] CWE-354 CVE-2023-48795: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other pr The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgr
nvdosv
CVE-2022-37026CRITICALCVSS 9.8fixed in 23.3.4.15≥ 24.0, < 24.3.4.2+1 more2022-09-21
CVE-2022-37026 [CRITICAL] CVE-2022-37026: In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Auth In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
nvdosv
CVE-2021-29221HIGHCVSS 7.0fixed in 23.2.32021-04-09
CVE-2021-29221 [HIGH] CWE-426 CVE-2021-29221: A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only unde
nvd
CVE-2020-35733HIGHCVSS 7.5fixed in 23.2.22021-01-15
CVE-2020-35733 [HIGH] CWE-295 CVE-2020-35733: An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
nvdosv
CVE-2020-25623HIGHCVSS 7.5≥ 22.3.0, < 22.3.4.6≥ 23.0.0, < 23.12020-10-02
CVE-2020-25623 [HIGH] CWE-22 CVE-2020-25623: Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can s Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.
nvdosv
CVE-2016-1000107MEDIUMCVSS 6.1≤ 22.12019-12-10
CVE-2016-1000107 [MEDIUM] CWE-601 CVE-2016-1000107: inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not pro inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in a
nvdosv
CVE-2017-1000385MEDIUMCVSS 5.9v18.3.4.7v19.3.6.4+1 more2017-12-12
CVE-2017-1000385 [MEDIUM] CWE-203 CVE-2017-1000385: The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).
nvdosv
CVE-2016-10253CRITICALCVSS 9.8v18.0v18.0.1+61 more2017-03-18
CVE-2016-10253 [CRITICAL] CWE-119 CVE-2016-10253: An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is v An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.
nvdosv
CVE-2015-2774MEDIUMCVSS 5.9≤ 18.02016-04-07
CVE-2015-2774 [MEDIUM] CVE-2015-2774: Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, w Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
nvdosv
CVE-2014-1693HIGHCVSS 7.5vr15b032014-12-08
CVE-2014-1693 [HIGH] CVE-2014-1693: Multiple CRLF injection vulnerabilities in the FTP module in Erlang/OTP R15B03 allow context-depende Multiple CRLF injection vulnerabilities in the FTP module in Erlang/OTP R15B03 allow context-dependent attackers to inject arbitrary FTP commands via CRLF sequences in the (1) user, (2) account, (3) cd, (4) ls, (5) nlist, (6) rename, (7) delete, (8) mkdir, (9) rmdir, (10) recv, (11) recv_bin, (12) recv_chunk_start, (13) send, (14) send_bin, (15) send_chunk_star
nvdosv
CVE-2011-0766HIGHCVSS 7.8vr11b-5vr12b-5+8 more2011-05-31
CVE-2011-0766 [HIGH] CWE-310 CVE-2011-0766: The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
nvdosv