CVE-2026-21620: CWE-23 Relative Path Traversal in Erlang OTP
Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.
AI Analysis
Technical Summary
CVE-2026-21620 is a relative path traversal vulnerability classified under CWE-23, found in the Erlang OTP project's TFTP file modules (specifically in lib/tftp/src/tftp_file.erl and src/tftp_file.erl). This vulnerability affects Erlang OTP versions starting from 17.0, including earlier versions such as 5.10 before 7.0 and 1.0, indicating a long-standing issue across multiple releases. The flaw arises due to improper isolation or compartmentalization in handling file paths within the TFTP server implementation, allowing an attacker to craft malicious file path inputs that traverse directories outside the intended file system boundaries. This can lead to unauthorized reading of files outside the designated TFTP root directory. The vulnerability requires network access (AV:N) and low attack complexity (AC:L), but it does require privileges (PR:L) and does not require user interaction (UI:N). The impact on confidentiality and integrity is low, with no impact on availability. The CVSS 4.0 base score is 2.3, reflecting the limited scope and impact. No known exploits have been reported in the wild, and no official patches have been linked yet, though it is expected that the Erlang OTP maintainers will address this in future releases.
Potential Impact
The primary impact of CVE-2026-21620 is unauthorized access to files outside the intended TFTP directory, which could lead to disclosure of sensitive information or unauthorized modification if the attacker can write files. However, since the vulnerability requires some level of privileges and does not allow remote code execution or denial of service, the overall risk is limited. Organizations running Erlang OTP TFTP services could face confidentiality breaches if attackers exploit this flaw to access configuration files, credentials, or other sensitive data stored on the server. The impact is more significant in environments where Erlang OTP TFTP servers are exposed to untrusted networks or where privilege separation is weak. Since no known exploits exist yet, the immediate risk is low, but the vulnerability should be addressed proactively to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2026-21620, organizations should first verify if their Erlang OTP deployments use the affected TFTP modules and versions. Restrict network access to TFTP services to trusted hosts only, using firewall rules or network segmentation. Implement strict privilege separation and run TFTP services with the least privileges necessary to limit the impact of potential exploitation. Monitor Erlang OTP project updates closely and apply patches promptly once available. In the interim, consider disabling the TFTP service if it is not essential. Additionally, validate and sanitize all file path inputs in custom implementations or wrappers around the TFTP modules to prevent path traversal. Employ file system access controls to restrict the TFTP server's file system permissions, ensuring it cannot access sensitive directories outside its root path.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, India, Brazil, Australia
CVE-2026-21620: CWE-23 Relative Path Traversal in Erlang OTP
Description
Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-21620 is a relative path traversal vulnerability classified under CWE-23, found in the Erlang OTP project's TFTP file modules (specifically in lib/tftp/src/tftp_file.erl and src/tftp_file.erl). This vulnerability affects Erlang OTP versions starting from 17.0, including earlier versions such as 5.10 before 7.0 and 1.0, indicating a long-standing issue across multiple releases. The flaw arises due to improper isolation or compartmentalization in handling file paths within the TFTP server implementation, allowing an attacker to craft malicious file path inputs that traverse directories outside the intended file system boundaries. This can lead to unauthorized reading of files outside the designated TFTP root directory. The vulnerability requires network access (AV:N) and low attack complexity (AC:L), but it does require privileges (PR:L) and does not require user interaction (UI:N). The impact on confidentiality and integrity is low, with no impact on availability. The CVSS 4.0 base score is 2.3, reflecting the limited scope and impact. No known exploits have been reported in the wild, and no official patches have been linked yet, though it is expected that the Erlang OTP maintainers will address this in future releases.
Potential Impact
The primary impact of CVE-2026-21620 is unauthorized access to files outside the intended TFTP directory, which could lead to disclosure of sensitive information or unauthorized modification if the attacker can write files. However, since the vulnerability requires some level of privileges and does not allow remote code execution or denial of service, the overall risk is limited. Organizations running Erlang OTP TFTP services could face confidentiality breaches if attackers exploit this flaw to access configuration files, credentials, or other sensitive data stored on the server. The impact is more significant in environments where Erlang OTP TFTP servers are exposed to untrusted networks or where privilege separation is weak. Since no known exploits exist yet, the immediate risk is low, but the vulnerability should be addressed proactively to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2026-21620, organizations should first verify if their Erlang OTP deployments use the affected TFTP modules and versions. Restrict network access to TFTP services to trusted hosts only, using firewall rules or network segmentation. Implement strict privilege separation and run TFTP services with the least privileges necessary to limit the impact of potential exploitation. Monitor Erlang OTP project updates closely and apply patches promptly once available. In the interim, consider disabling the TFTP service if it is not essential. Additionally, validate and sanitize all file path inputs in custom implementations or wrappers around the TFTP modules to prevent path traversal. Employ file system access controls to restrict the TFTP server's file system permissions, ensuring it cannot access sensitive directories outside its root path.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- EEF
- Date Reserved
- 2026-01-01T03:46:45.934Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699842282c4d84f260dc3158
Added to database: 2/20/2026, 11:14:48 AM
Last enriched: 2/20/2026, 11:28:54 AM
Last updated: 2/20/2026, 2:12:41 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2486: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons For Elementor – White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-10970: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Kolay Software Inc. Talentics
CriticalCVE-2026-26050: Uncontrolled Search Path Element in Ricoh Company, Ltd. ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール
HighCVE-2025-59819: Vulnerability in zenitel alphacom_xe_audio_server
MediumCVE-2026-26370: Cross-site scripting (XSS) in Ays Pro Survey Maker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.