Erlang/OTP 22.3.4.27

CPE Details

Erlang/OTP 22.3.4.27
22.3.4.27
2025-06-12
12h01 +00:00
2025-06-12
12h01 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:erlang:erlang\/otp:22.3.4.27:*:*:*:*:*:*:*

Informations

Vendor

erlang

Product

erlang\/otp

Version

22.3.4.27

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-32433 2025-04-16 21h34 +00:00 Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
10
Critical
CVE-2022-37026 2022-09-21 00h00 +00:00 In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
9.8
Critical
CVE-2021-29221 2021-04-09 11h34 +00:00 A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
7
High
CVE-2020-35733 2021-01-15 12h35 +00:00 An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
7.5
High