CVE-2025-48039: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
AI Analysis
Technical Summary
CVE-2025-48039 is a resource allocation vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption) affecting the Erlang Open Telecom Platform (OTP), specifically within the ssh_sftp modules. The flaw exists in the ssh_sftpd.erl source file, where the system fails to impose limits or throttling on resource allocation during SSH or SFTP operations. This can lead to excessive allocation of memory or other resources, resulting in resource leaks and potential exhaustion. The affected OTP versions range from 17.0 up to 28.0.3, including specific patch versions of OTP 27 and 26, and corresponding ssh package versions from 3.0.1 to 5.3.3. The vulnerability can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. Exploitation could cause denial of service by exhausting server resources, impacting availability of services relying on Erlang OTP's SSH/SFTP components. The CVSS 4.0 base score is 5.3, reflecting medium severity due to network vector, low complexity, no privileges required, and limited impact on confidentiality and integrity but notable impact on availability. No public exploits have been reported yet, but the broad version range and network accessibility increase the risk of future exploitation. The vulnerability is particularly relevant for organizations using Erlang OTP in telecommunications, distributed systems, and cloud environments where SSH/SFTP services are critical.
Potential Impact
The primary impact of CVE-2025-48039 is on the availability of systems running vulnerable versions of Erlang OTP's ssh_sftp modules. An attacker can remotely trigger excessive resource allocation, leading to resource exhaustion such as memory leaks or CPU saturation, which can cause denial of service (DoS). This can disrupt critical services that rely on Erlang OTP for secure shell or file transfer operations, potentially causing downtime and operational disruption. While confidentiality and integrity impacts are minimal, the availability impact can be significant, especially in high-availability environments like telecom infrastructure, cloud platforms, and financial services that depend on Erlang OTP. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of automated attacks or large-scale exploitation attempts. Organizations with large Erlang OTP deployments may face increased operational costs and reputational damage if services are interrupted. Additionally, resource exhaustion could be leveraged as part of multi-stage attacks to facilitate further compromise or lateral movement.
Mitigation Recommendations
To mitigate CVE-2025-48039, organizations should first apply any official patches or updates released by the Erlang OTP maintainers once available. In the absence of patches, administrators should implement resource limiting controls at the system and network levels. This includes configuring operating system-level resource limits (e.g., ulimit for memory and CPU usage) on processes running Erlang OTP services. Network-level rate limiting and connection throttling can reduce the risk of resource exhaustion from excessive SSH/SFTP requests. Monitoring resource usage and setting up alerts for unusual spikes in memory or CPU consumption related to ssh_sftp processes can enable early detection of exploitation attempts. Employing application-layer firewalls or intrusion prevention systems to detect and block abnormal SSH/SFTP traffic patterns may also help. Where feasible, isolating Erlang OTP SSH/SFTP services in dedicated environments or containers can limit the blast radius of an attack. Finally, reviewing and minimizing the exposure of SSH/SFTP services to untrusted networks reduces the attack surface. Detailed code review and testing of ssh_sftpd.erl for resource management improvements is recommended for long-term remediation.
Affected Countries
United States, Germany, India, China, United Kingdom, France, Japan, South Korea, Brazil, Canada, Australia, Netherlands, Sweden
CVE-2025-48039: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
Description
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-48039 is a resource allocation vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption) affecting the Erlang Open Telecom Platform (OTP), specifically within the ssh_sftp modules. The flaw exists in the ssh_sftpd.erl source file, where the system fails to impose limits or throttling on resource allocation during SSH or SFTP operations. This can lead to excessive allocation of memory or other resources, resulting in resource leaks and potential exhaustion. The affected OTP versions range from 17.0 up to 28.0.3, including specific patch versions of OTP 27 and 26, and corresponding ssh package versions from 3.0.1 to 5.3.3. The vulnerability can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. Exploitation could cause denial of service by exhausting server resources, impacting availability of services relying on Erlang OTP's SSH/SFTP components. The CVSS 4.0 base score is 5.3, reflecting medium severity due to network vector, low complexity, no privileges required, and limited impact on confidentiality and integrity but notable impact on availability. No public exploits have been reported yet, but the broad version range and network accessibility increase the risk of future exploitation. The vulnerability is particularly relevant for organizations using Erlang OTP in telecommunications, distributed systems, and cloud environments where SSH/SFTP services are critical.
Potential Impact
The primary impact of CVE-2025-48039 is on the availability of systems running vulnerable versions of Erlang OTP's ssh_sftp modules. An attacker can remotely trigger excessive resource allocation, leading to resource exhaustion such as memory leaks or CPU saturation, which can cause denial of service (DoS). This can disrupt critical services that rely on Erlang OTP for secure shell or file transfer operations, potentially causing downtime and operational disruption. While confidentiality and integrity impacts are minimal, the availability impact can be significant, especially in high-availability environments like telecom infrastructure, cloud platforms, and financial services that depend on Erlang OTP. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of automated attacks or large-scale exploitation attempts. Organizations with large Erlang OTP deployments may face increased operational costs and reputational damage if services are interrupted. Additionally, resource exhaustion could be leveraged as part of multi-stage attacks to facilitate further compromise or lateral movement.
Mitigation Recommendations
To mitigate CVE-2025-48039, organizations should first apply any official patches or updates released by the Erlang OTP maintainers once available. In the absence of patches, administrators should implement resource limiting controls at the system and network levels. This includes configuring operating system-level resource limits (e.g., ulimit for memory and CPU usage) on processes running Erlang OTP services. Network-level rate limiting and connection throttling can reduce the risk of resource exhaustion from excessive SSH/SFTP requests. Monitoring resource usage and setting up alerts for unusual spikes in memory or CPU consumption related to ssh_sftp processes can enable early detection of exploitation attempts. Employing application-layer firewalls or intrusion prevention systems to detect and block abnormal SSH/SFTP traffic patterns may also help. Where feasible, isolating Erlang OTP SSH/SFTP services in dedicated environments or containers can limit the blast radius of an attack. Finally, reviewing and minimizing the exposure of SSH/SFTP services to untrusted networks reduces the attack surface. Detailed code review and testing of ssh_sftpd.erl for resource management improvements is recommended for long-term remediation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- EEF
- Date Reserved
- 2025-05-15T08:36:04.576Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c31dfb563d4c3db05f6e4c
Added to database: 9/11/2025, 7:07:39 PM
Last enriched: 2/28/2026, 2:54:27 PM
Last updated: 3/25/2026, 12:41:00 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.