Description
Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Published: 2025-09-11
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Uncontrolled resource consumption is possible in the Erlang OTP SSH SFTP daemon when a malicious client sends specially crafted key‑exchange messages. The vulnerability causes the server to allocate excessive memory or other resources, leading to flooding and eventual denial of service. It aligns with CWE‑400 and CWE‑770 weaknesses.

Affected Systems

The flaw is present in Erlang/OTP releases from version 17.0 up to and including 28.0.3, as well as 27.3.4.3 and 26.2.5.15. The issue resides in the ssh_sftpd module (lib/ssh/src/ssh_sftpd.erl) and affects SSH/SFTP servers using OTP‑provided SSH binaries from 3.0.1 through 5.3.3, 5.2.11.3, and 5.1.4.12.

Risk and Exploitability

The CVSS base score of 6.9 denotes moderate severity, while the EPSS score of less than 1 % suggests a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, an attacker could exploit the weakness from the network by initiating an SSH connection and super‑regularly demanding key‑exchange, thereby stressing the target’s resources. The recommended approach is to apply a vendor patch or upgrade, as the official fixes are available in newer OTP releases; in the interim, disabling parallel logins and lowering max_sessions reduces potential impact.

Generated by OpenCVE AI on April 22, 2026 at 22:13 UTC.

Remediation

Vendor Workaround

* set option parallel_login to false * reduce max_sessions option


OpenCVE Recommended Actions

  • Upgrade Erlang/OTP to the latest release where the ssh_sftpd resource‑management issue has been fixed.
  • Configure the SSH daemon by setting the parallel_login option to false to prevent concurrent authentication attempts.
  • Reduce the max_sessions setting to limit the number of simultaneous SSH sessions a user can open.

Generated by OpenCVE AI on April 22, 2026 at 22:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27677 Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
History

Mon, 06 Apr 2026 16:45:00 +0000


Fri, 12 Sep 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Fri, 12 Sep 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Erlang otp
Vendors & Products Erlang otp

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Title Malicious Key Exchange Messages may Lead to Excessive Resource Consumption
First Time appeared Erlang
Erlang erlang\/otp
Weaknesses CWE-400
CWE-770
CPEs cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
Vendors & Products Erlang
Erlang erlang\/otp
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: EEF

Published:

Updated: 2026-04-06T16:44:01.688Z

Reserved: 2025-05-15T08:40:25.455Z

Link: CVE-2025-48040

cve-icon Vulnrichment

Updated: 2025-09-11T13:30:37.281Z

cve-icon NVD

Status : Deferred

Published: 2025-09-11T09:15:34.400

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-48040

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-09-11T08:14:19Z

Links: CVE-2025-48040 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:15:26Z

Weaknesses