Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Fixes

Solution

No solution given by the vendor.


Workaround

* set option parallel_login to false * reduce max_sessions option

History

Thu, 11 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Title Malicious Key Exchange Messages may Lead to Excessive Resource Consumption
First Time appeared Erlang
Erlang erlang\/otp
Weaknesses CWE-400
CWE-770
CPEs cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
Vendors & Products Erlang
Erlang erlang\/otp
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: EEF

Published:

Updated: 2025-09-11T08:14:19.671Z

Reserved: 2025-05-15T08:40:25.455Z

Link: CVE-2025-48040

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-11T09:15:34.400

Modified: 2025-09-11T09:15:34.400

Link: CVE-2025-48040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.