{"id":"CVE-2025-46712","summary":"Erlang/OTP SSH Has Strict KEX Violations","details":"Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).","aliases":["GHSA-934x-xq38-hhqf"],"modified":"2026-04-10T05:28:31.103296Z","published":"2025-05-08T19:26:27.563Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46712.json","cwe_ids":["CWE-440"]},"references":[{"type":"WEB","url":"https://github.com/erlang/otp/releases/tag/OTP-25.3.2.21"},{"type":"WEB","url":"https://github.com/erlang/otp/releases/tag/OTP-26.2.5.12"},{"type":"WEB","url":"https://github.com/erlang/otp/releases/tag/OTP-27.3.4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46712.json"},{"type":"ADVISORY","url":"https://github.com/erlang/otp/security/advisories/GHSA-934x-xq38-hhqf"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46712"},{"type":"FIX","url":"https://github.com/erlang/otp/commit/e4b56a9f4a511aa9990dd86c16c61439c828df83"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"e4b56a9f4a511aa9990dd86c16c61439c828df83"}]},{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"52199ed7e79646b73bacc47c92967ce9970b2373"}]},{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"7335f79eeaa0094c274dab2aa2ced9e138027c75"}]},{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"c388a2d1b3f9918652276d4798692dd4d8ef97fc"}]}],"versions":["OTP-17.0","OTP-18.0","OTP-18.0-rc1","OTP-19.0","OTP-19.0-rc1","OTP-19.0-rc2","OTP-20.0","OTP-20.0-rc1","OTP-20.0-rc2","OTP-21.0","OTP-21.0-rc1","OTP-21.0-rc2","OTP-22.0","OTP-22.0-rc1","OTP-22.0-rc2","OTP-22.0-rc3","OTP-23.0","OTP-23.0-rc1","OTP-23.0-rc2","OTP-23.0-rc3","OTP-24.0","OTP-24.0-rc1","OTP-24.0-rc2","OTP-24.0-rc3","OTP-25.0","OTP-25.0-rc1","OTP-25.0-rc2","OTP-25.0-rc3","OTP-25.1","OTP-25.2","OTP-25.3","OTP-25.3.1","OTP-25.3.2","OTP-25.3.2.1","OTP-25.3.2.10","OTP-25.3.2.11","OTP-25.3.2.12","OTP-25.3.2.13","OTP-25.3.2.14","OTP-25.3.2.15","OTP-25.3.2.16","OTP-25.3.2.17","OTP-25.3.2.18","OTP-25.3.2.19","OTP-25.3.2.2","OTP-25.3.2.20","OTP-25.3.2.3","OTP-25.3.2.4","OTP-25.3.2.5","OTP-25.3.2.6","OTP-25.3.2.7","OTP-25.3.2.8","OTP-25.3.2.9","OTP-26.0","OTP-26.0-rc1","OTP-26.0-rc2","OTP-26.0-rc3","OTP-26.1","OTP-26.2","OTP-26.2.3","OTP-26.2.4","OTP-26.2.5","OTP-26.2.5.1","OTP-26.2.5.10","OTP-26.2.5.11","OTP-26.2.5.2","OTP-26.2.5.3","OTP-26.2.5.4","OTP-26.2.5.5","OTP-26.2.5.6","OTP-26.2.5.7","OTP-26.2.5.8","OTP-26.2.5.9","OTP-27.0","OTP-27.0-rc1","OTP-27.0-rc2","OTP-27.0-rc3","OTP-27.1","OTP-27.2","OTP-27.3","OTP-27.3.1","OTP-27.3.2","OTP-27.3.3","OTP_17.0-rc1","OTP_17.0-rc2","OTP_R13B03","OTP_R13B04","OTP_R14A","OTP_R14B","OTP_R14B01","OTP_R14B02","OTP_R14B03","OTP_R15A","OTP_R15B","OTP_R16A_RELEASE_CANDIDATE","OTP_R16B","patch-base-25","patch-base-26"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46712.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}