← Volver a CVEs
CVE-2022-37026
CRITICAL9.8
Descripcion
In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/21/2022
Ultima modificacion5/27/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
erlang:erlang\/otp
Referencias
https://erlangforums.com/c/erlang-news-announcements/91(cve@mitre.org)
https://erlangforums.com/t/otp-25-1-released/1854(cve@mitre.org)
https://erlangforums.com/c/erlang-news-announcements/91(af854a3a-2127-422b-91ae-364da2661108)
https://erlangforums.com/t/otp-25-1-released/1854(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/erlang/otp/compare/OTP-23.3.4.14...OTP-23.3.4.15(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/07/msg00012.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.