← Retour aux CVEs
CVE-2022-37026
CRITICAL9.8
Description
In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/21/2022
Derniere modification5/27/2025
Sourcenvd
Observations honeypot0
Produits affectes
erlang:erlang\/otp
References
https://erlangforums.com/c/erlang-news-announcements/91(cve@mitre.org)
https://erlangforums.com/t/otp-25-1-released/1854(cve@mitre.org)
https://erlangforums.com/c/erlang-news-announcements/91(af854a3a-2127-422b-91ae-364da2661108)
https://erlangforums.com/t/otp-25-1-released/1854(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/erlang/otp/compare/OTP-23.3.4.14...OTP-23.3.4.15(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/07/msg00012.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.