CVE-2025-48040
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-11

Last updated on: 2026-04-06

Assigner: EEF

Description
Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-11
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2025-09-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
erlang ssh 3.0.1
erlang ssh 5.2.11.3
erlang otp 17.0
erlang ssh 5.1.4.12
erlang otp 27.3.4.3
erlang otp 28.0.3
erlang ssh 5.3.3
erlang otp 26.2.5.15
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-48040 is an Uncontrolled Resource Consumption vulnerability in the Erlang OTP ssh (ssh_sftp modules). It occurs during the SSH key exchange (KEX) process when an attacker sends malicious KEXINIT messages containing an excessive number or size of algorithms or cryptographic parameters. This causes the system to allocate excessive CPU and memory resources processing these inputs, leading to resource exhaustion. The vulnerability arises because the system does not properly limit or throttle resource allocation during this phase. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by causing denial of service (DoS) conditions. An attacker can remotely exploit it without any privileges or user interaction by sending specially crafted SSH key exchange messages that consume excessive CPU and memory resources. This can make the affected system unavailable or degrade its performance due to resource exhaustion. The impact is limited to availability and does not affect confidentiality or integrity. [2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2025-48040, immediately update Erlang/OTP to one of the patched versions: OTP 28.0.3, 27.3.4.3, or 26.2.5.15, and SSH (OTP) versions 5.3.3, 5.2.11.3, or 5.1.4.12. As a workaround, set the SSH option 'parallel_login' to false and reduce the 'max_sessions' option to limit resource consumption and reduce the risk of denial of service. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart