Memory Consumption Flaw in Erlang/OTP Affecting Multiple Versions
CVE-2025-30211

7.5HIGH

Key Information:

Vendor

Erlang

Status
Vendor
CVE Published:
28 March 2025

What is CVE-2025-30211?

Erlang/OTP prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19 is susceptible to a memory consumption vulnerability triggered by malformed KEX init messages. The implementation fails to limit the length of algorithm names in accordance with RFC standards (64 characters), potentially leading to excessive memory allocation and inefficient processing of error data. This can severely impact system performance. Users are advised to upgrade to the latest versions to mitigate this risk. Alternatively, it is recommended to disable parallel login by adjusting the 'parallel_login' option to 'false' and to reduce the 'max_sessions' configuration.

Affected Version(s)

otp < OTP-27.3.1 < OTP-27.3.1

otp < OTP-26.2.5.10 < OTP-26.2.5.10

otp < OTP-25.3.2.19 < OTP-25.3.2.19

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.