CVE-2025-48040
Erlang OTP vulnerability analysis and mitigation

Overview

CVE-2025-48040 is a vulnerability in Erlang OTP's SSH implementation that affects versions from 17.0 onwards until versions 28.0.3, 27.3.4.3, and 26.2.5.15 (for OTP) and versions 5.3.3, 5.2.11.3, and 5.1.4.12 (for ssh component). The vulnerability was discovered and disclosed on September 10, 2025. The issue allows malicious key exchange messages to lead to excessive CPU and memory usage due to overly tolerant handling of data received from unauthenticated users (GHSA Advisory).

Technical details

The vulnerability stems from two main issues in the SSH key exchange implementation: 1) Processing of an excessive number of validly sized algorithms specified in the KEXINIT message, and 2) Handling of cryptographic parameters with excessive size that cause cryptographic operations to generate unusually large exception data, which is then unnecessarily processed. The vulnerability has been assigned a CVSS v4.0 score of 6.9 (Moderate) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N (GHSA Advisory).

Impact

When exploited, this vulnerability can lead to excessive CPU and memory resource consumption on affected systems. The impact primarily affects system availability through resource exhaustion, though there are no direct impacts on system confidentiality or integrity (GHSA Advisory).

Mitigation and workarounds

Two temporary workarounds are available before applying the patch: 1) Set the option 'parallellogin' to false, and 2) Reduce the 'maxsessions' option. For a permanent fix, users should upgrade to the patched versions: OTP versions 28.0.3, 27.3.4.3, or 26.2.5.15, or ssh component versions 5.3.3, 5.2.11.3, or 5.1.4.12 (GHSA Advisory).

Additional resources


SourceThis report was generated using AI

Related Erlang OTP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-32433CRITICAL10
  • CBL MarinerCBL Mariner
  • erlang26-debugger
YesYesApr 16, 2025
CVE-2025-48041HIGH7.1
  • Erlang OTPErlang OTP
  • cpe:2.3:a:erlang:erlang\/otp
NoYesSep 11, 2025
CVE-2025-48040MEDIUM6.9
  • Erlang OTPErlang OTP
  • cpe:2.3:a:erlang:erlang\/otp
NoYesSep 11, 2025
CVE-2025-48039MEDIUM5.3
  • Erlang OTPErlang OTP
  • erlang
NoYesSep 11, 2025
CVE-2025-48038MEDIUM5.3
  • Erlang OTPErlang OTP
  • cpe:2.3:a:erlang:erlang\/otp
NoYesSep 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management