Vulnerability description

Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding.

This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.

Affected

Erlang / OTP  » ssh_sftp

Module Source File
ssh_sftp lib/ssh/src/ssh_sftpd.erl
Status Version Changes / Fixed in
affected pkg:otp/ssh@3.0.1
  • unaffected at pkg:otp/ssh@5.3.3
  • unaffected at pkg:otp/ssh@5.2.11.3
  • unaffected at pkg:otp/ssh@5.1.4.12
affected 17.0
  • unaffected at 28.0.3
  • unaffected at 27.3.4.3
  • unaffected at 26.2.5.15
affected 07b8f441ca711f9812fad9e9115bab3c3aa92f79
  • unaffected at 7cd7abb7e19e16b027eaee6a54e1f6fbbe21181a
  • unaffected at 548f1295d86d0803da884db8685cc16d461d0d5a

Workarounds

  • set option parallel_login to false
  • reduce max_sessions option

References

Credits

  • Remediation developer: Jakub Witczak
  • Remediation reviewer: Ingela Andin

CVE record as JSON:  GET /cves/cve-2025-48040.json