Skip to main content

CVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP

High
VulnerabilityCVE-2025-48041cvecve-2025-48041cwe-770cwe-400
Published: Thu Sep 11 2025 (09/11/2025, 08:14:20 UTC)
Source: CVE Database V5
Vendor/Project: Erlang
Product: OTP

Description

Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.

AI-Powered Analysis

AILast updated: 09/11/2025, 19:09:22 UTC

Technical Analysis

CVE-2025-48041 is a high-severity vulnerability affecting the Erlang Open Telecom Platform (OTP), specifically within the ssh_sftp modules of the OTP ssh implementation. The vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-400 (Uncontrolled Resource Consumption). It allows an attacker to cause excessive resource allocation and flooding by exploiting the ssh_sftp server component (lib/ssh/src/ssh_sftpd.erl). This can lead to denial of service conditions by exhausting system resources such as memory or CPU, potentially impacting the availability of services relying on Erlang OTP's SSH server. The affected versions span a wide range of OTP releases, from OTP 17.0 through OTP 28.0.3, including specific patch versions 27.3.4.3 and 26.2.5.15, and ssh versions from 3.0.1 up to 5.3.3 and related sub-versions. The vulnerability does not require user interaction or authentication but does require low privileges (PR:L), meaning an attacker with some level of access can exploit it remotely (AV:N). The CVSS v4.0 score is 7.1, reflecting high severity due to the potential for high impact on availability without the need for user interaction or complex attack conditions. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that organizations should prioritize monitoring and mitigation efforts. The root cause is the lack of proper limits or throttling on resource allocation within the ssh_sftp server, allowing attackers to flood the service and degrade or deny legitimate access.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Erlang OTP for critical infrastructure, telecommunications, or backend services that utilize SSH and SFTP for secure file transfers and remote management. Exploitation could lead to denial of service, disrupting business operations, causing downtime, and potentially affecting service level agreements (SLAs). Organizations in sectors such as telecommunications, finance, and government, which often deploy Erlang-based systems for their robustness and concurrency capabilities, may face operational interruptions. Additionally, the resource exhaustion could be leveraged as part of a broader attack strategy to distract or degrade defenses while other attacks are conducted. The lack of authentication requirement for exploitation increases the risk surface, as attackers can initiate flooding remotely. Given the widespread use of Erlang OTP in European telecom infrastructure and backend systems, the threat could affect a broad range of enterprises and service providers, potentially impacting end-users and customers.

Mitigation Recommendations

1. Immediate mitigation should include monitoring and limiting incoming SSH/SFTP connections to Erlang OTP servers, employing network-level rate limiting and connection throttling to prevent flooding attacks. 2. Deploy application-layer controls to detect and block abnormal SSH/SFTP session behaviors indicative of resource exhaustion attempts. 3. Isolate Erlang OTP SSH services behind firewalls or intrusion prevention systems (IPS) configured to detect excessive resource usage patterns. 4. Apply strict access controls and network segmentation to limit exposure of vulnerable OTP SSH services to untrusted networks. 5. Since no patches are currently linked, organizations should engage with Erlang OTP maintainers or vendors for updates and apply patches promptly once available. 6. Implement resource quotas and limits at the operating system or container level to prevent a single service from exhausting system resources. 7. Conduct regular vulnerability scanning and penetration testing focused on SSH/SFTP services to identify potential exploitation attempts. 8. Maintain comprehensive logging and alerting on Erlang OTP SSH service resource usage to enable rapid detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
EEF
Date Reserved
2025-05-15T08:40:25.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c31dfb563d4c3db05f6e5a

Added to database: 9/11/2025, 7:07:39 PM

Last enriched: 9/11/2025, 7:09:22 PM

Last updated: 9/11/2025, 7:09:22 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats