Impact
The vulnerability arises from improper handling of highly compressed data (compression bomb) in Erlang OTP SSH, where the SSH transport layer inflates zlib packets before authentication without any size limit. This unbounded decompression allows an attacker to send a small compressed payload that expands to hundreds of megabytes, consuming server memory and causing an out‑of‑memory termination or prolonged unavailability. The weakness is classified as CWE‑409: Excessive Resource Consumption, directly leading to a denial‑of‑service impact without granting code execution or data exfiltration capabilities.
Affected Systems
OTP releases from 17.0 through 28.4.1, 27.3.4.9, and 26.2.5.18 (corresponding to SSH libraries 3.0.1 to 5.5.1, 5.2.11.6, and 5.1.4.14) are affected when using the default SSH configuration. All deployments of these OTP releases are vulnerable.
Risk and Exploitability
The CVSS score is 6.9 indicating moderate severity. EPSS indicates exploitation probability below 1%, and the vulnerability is not listed in the CISA KEV catalog. Exfiltration of data or code execution is not possible; the attack is limited to memory exhaustion. The likely attack vector is remote, unauthenticated via the pre‑authentication zlib compression algorithm on the SSH port. An attacker with network connectivity can repeatedly send compressed packets to de memory and induce a denial‑of‑service. Authenticated exploitation is also possible via the zlib@openssh.com algorithm, but the impact remains a service outage.
OpenCVE Enrichment