First published: Thu May 08 2025(Updated: )
Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang/OTP | <OTP-27.3.4<OTP-26.2.5.12<OTP-25.3.2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46712 is considered to have a high severity due to its impact on the SSH KEX handshake process.
To fix CVE-2025-46712, update your Erlang/OTP to versions OTP-27.3.4, OTP-26.2.5.12, or OTP-25.3.2.21 or later.
CVE-2025-46712 affects Erlang/OTP versions prior to OTP-27.3.4, OTP-26.2.5.12, and OTP-25.3.2.21.
CVE-2025-46712 compromises the enforcement of strict KEX handshake hardening measures in Erlang/OTP SSH.
There is no publicly documented workaround for CVE-2025-46712; upgrading is the recommended course of action.