Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
* set option parallel_login to false * reduce max_sessions option
References
History
Thu, 11 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12. | |
Title | Malicious Key Exchange Messages may Lead to Excessive Resource Consumption | |
First Time appeared |
Erlang
Erlang erlang\/otp |
|
Weaknesses | CWE-400 CWE-770 |
|
CPEs | cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:* | |
Vendors & Products |
Erlang
Erlang erlang\/otp |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: EEF
Published:
Updated: 2025-09-11T08:14:19.671Z
Reserved: 2025-05-15T08:40:25.455Z
Link: CVE-2025-48040

No data.

Status : Received
Published: 2025-09-11T09:15:34.400
Modified: 2025-09-11T09:15:34.400
Link: CVE-2025-48040

No data.

No data.