Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48039: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP

0
Medium
VulnerabilityCVE-2025-48039cvecve-2025-48039cwe-770cwe-400
Published: Thu Sep 11 2025 (09/11/2025, 08:13:36 UTC)
Source: CVE Database V5
Vendor/Project: Erlang
Product: OTP

Description

Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:54:27 UTC

Technical Analysis

CVE-2025-48039 is a resource allocation vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption) affecting the Erlang Open Telecom Platform (OTP), specifically within the ssh_sftp modules. The flaw exists in the ssh_sftpd.erl source file, where the system fails to impose limits or throttling on resource allocation during SSH or SFTP operations. This can lead to excessive allocation of memory or other resources, resulting in resource leaks and potential exhaustion. The affected OTP versions range from 17.0 up to 28.0.3, including specific patch versions of OTP 27 and 26, and corresponding ssh package versions from 3.0.1 to 5.3.3. The vulnerability can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. Exploitation could cause denial of service by exhausting server resources, impacting availability of services relying on Erlang OTP's SSH/SFTP components. The CVSS 4.0 base score is 5.3, reflecting medium severity due to network vector, low complexity, no privileges required, and limited impact on confidentiality and integrity but notable impact on availability. No public exploits have been reported yet, but the broad version range and network accessibility increase the risk of future exploitation. The vulnerability is particularly relevant for organizations using Erlang OTP in telecommunications, distributed systems, and cloud environments where SSH/SFTP services are critical.

Potential Impact

The primary impact of CVE-2025-48039 is on the availability of systems running vulnerable versions of Erlang OTP's ssh_sftp modules. An attacker can remotely trigger excessive resource allocation, leading to resource exhaustion such as memory leaks or CPU saturation, which can cause denial of service (DoS). This can disrupt critical services that rely on Erlang OTP for secure shell or file transfer operations, potentially causing downtime and operational disruption. While confidentiality and integrity impacts are minimal, the availability impact can be significant, especially in high-availability environments like telecom infrastructure, cloud platforms, and financial services that depend on Erlang OTP. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of automated attacks or large-scale exploitation attempts. Organizations with large Erlang OTP deployments may face increased operational costs and reputational damage if services are interrupted. Additionally, resource exhaustion could be leveraged as part of multi-stage attacks to facilitate further compromise or lateral movement.

Mitigation Recommendations

To mitigate CVE-2025-48039, organizations should first apply any official patches or updates released by the Erlang OTP maintainers once available. In the absence of patches, administrators should implement resource limiting controls at the system and network levels. This includes configuring operating system-level resource limits (e.g., ulimit for memory and CPU usage) on processes running Erlang OTP services. Network-level rate limiting and connection throttling can reduce the risk of resource exhaustion from excessive SSH/SFTP requests. Monitoring resource usage and setting up alerts for unusual spikes in memory or CPU consumption related to ssh_sftp processes can enable early detection of exploitation attempts. Employing application-layer firewalls or intrusion prevention systems to detect and block abnormal SSH/SFTP traffic patterns may also help. Where feasible, isolating Erlang OTP SSH/SFTP services in dedicated environments or containers can limit the blast radius of an attack. Finally, reviewing and minimizing the exposure of SSH/SFTP services to untrusted networks reduces the attack surface. Detailed code review and testing of ssh_sftpd.erl for resource management improvements is recommended for long-term remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
EEF
Date Reserved
2025-05-15T08:36:04.576Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c31dfb563d4c3db05f6e4c

Added to database: 9/11/2025, 7:07:39 PM

Last enriched: 2/28/2026, 2:54:27 PM

Last updated: 3/25/2026, 12:41:00 AM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses