Impact
The vulnerability originates in the ssh_sftp module of Erlang OTP, where the allocation of file handles lacks any limits or throttling. Attackers who can initiate SFTP connections can trigger an uncontrolled growth of open file descriptors, leading to exhaustion of system resources and potentially causing a denial of service. The weakness aligns with CWE‑400 (Control of Resource Consumption) and CWE‑770 (Allocation of Resources Without Limits).
Affected Systems
This issue is present in Erlang OTP releases starting from OTP 17.0 up through OTP 28.0.3, as well as specific intermediate releases (OTP 27.3.4.3 and OTP 26.2.5.15). The vulnerability affects the ssh component versions from 3.0.1 to 5.3.3, 5.2.11.3, and 5.1.4.12. Systems running these versions of Erlang OTP are subject to the risk.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% reflects a very low current exploitation probability. The vulnerability is not listed in CISA's KEV catalog. While the description does not explicitly provide the required privilege level, it is inferred that an attacker must be able to create SFTP sessions against the vulnerable ssh service to trigger the issue. Successful exploitation could lead to a denial of service by exhausting file descriptors and other related resources.
OpenCVE Enrichment
Debian DLA
EUVD