CVE-2025-48040
BaseFortify
Publication date: 2025-09-11
Last updated on: 2026-04-06
Assigner: EEF
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| erlang | ssh | 3.0.1 |
| erlang | ssh | 5.2.11.3 |
| erlang | otp | 17.0 |
| erlang | ssh | 5.1.4.12 |
| erlang | otp | 27.3.4.3 |
| erlang | otp | 28.0.3 |
| erlang | ssh | 5.3.3 |
| erlang | otp | 26.2.5.15 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48040 is an Uncontrolled Resource Consumption vulnerability in the Erlang OTP ssh (ssh_sftp modules). It occurs during the SSH key exchange (KEX) process when an attacker sends malicious KEXINIT messages containing an excessive number or size of algorithms or cryptographic parameters. This causes the system to allocate excessive CPU and memory resources processing these inputs, leading to resource exhaustion. The vulnerability arises because the system does not properly limit or throttle resource allocation during this phase. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by causing denial of service (DoS) conditions. An attacker can remotely exploit it without any privileges or user interaction by sending specially crafted SSH key exchange messages that consume excessive CPU and memory resources. This can make the affected system unavailable or degrade its performance due to resource exhaustion. The impact is limited to availability and does not affect confidentiality or integrity. [2]
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2025-48040, immediately update Erlang/OTP to one of the patched versions: OTP 28.0.3, 27.3.4.3, or 26.2.5.15, and SSH (OTP) versions 5.3.3, 5.2.11.3, or 5.1.4.12. As a workaround, set the SSH option 'parallel_login' to false and reduce the 'max_sessions' option to limit resource consumption and reduce the risk of denial of service. [2]