← Back to CVEs
CVE-2022-37026
CRITICAL9.8
Description
In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/21/2022
Last Modified5/27/2025
Sourcenvd
Honeypot Sightings0
Affected Products
erlang:erlang\/otp
References
https://erlangforums.com/c/erlang-news-announcements/91(cve@mitre.org)
https://erlangforums.com/t/otp-25-1-released/1854(cve@mitre.org)
https://erlangforums.com/c/erlang-news-announcements/91(af854a3a-2127-422b-91ae-364da2661108)
https://erlangforums.com/t/otp-25-1-released/1854(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/erlang/otp/compare/OTP-23.3.4.14...OTP-23.3.4.15(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/07/msg00012.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.