CVE-2025-46712: Erlang/OTP SSH Has Strict KEX Violations

3.7 CVSS

Description

Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).

Classification

CVE ID: CVE-2025-46712

CVSS Base Severity: LOW

CVSS Base Score: 3.7

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem Types

CWE-440: Expected Behavior Violation

Affected Products

Vendor: erlang

Product: otp

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 7.81% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-46712
https://github.com/erlang/otp/security/advisories/GHSA-934x-xq38-hhqf
https://github.com/erlang/otp/releases/tag/OTP-25.3.2.21
https://github.com/erlang/otp/releases/tag/OTP-26.2.5.12
https://github.com/erlang/otp/releases/tag/OTP-27.3.4

Timeline