← Back to home
wid-sec-w-2026-0998  ·  Published 2026-04-07  ·  View on BSI CERT-Bund ↗

Erlang/OTP: Multiple Vulnerabilities

CVSS 8.3 HIGH

Risk Summary

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Erlang/OTP ausnutzen, um Sicherheitsvorkehrungen zu umgehen und Daten zu manipulieren.

Affected Vendors

Open Source

Affected Products (26)

Open Source · Erlang/OTP <28.4.2
Open Source · Erlang/OTP 28.4.2
Open Source · Erlang/OTP <27.3.4.10
Open Source · Erlang/OTP 27.3.4.10
Open Source · Erlang/OTP <26.2.5.19
Open Source · Erlang/OTP 26.2.5.19
Open Source · Erlang/OTP inets <9.1.0.6
Open Source · Erlang/OTP inets 9.1.0.6
Open Source · Erlang/OTP inets <9.3.2.4
Open Source · Erlang/OTP inets 9.3.2.4
Open Source · Erlang/OTP inets <9.6.2
Open Source · Erlang/OTP inets 9.6.2
Open Source · Erlang/OTP kernel <9.2.4.11
Open Source · Erlang/OTP kernel 9.2.4.11
Open Source · Erlang/OTP kernel <10.2.7.4
Open Source · Erlang/OTP kernel 10.2.7.4
Open Source · Erlang/OTP kernel <10.6.2
Open Source · Erlang/OTP kernel 10.6.2
Open Source · Erlang/OTP public key <1.17.1.2
Open Source · Erlang/OTP public key 1.17.1.2
Open Source · Erlang/OTP public key <1.20.3
Open Source · Erlang/OTP public key 1.20.3
Open Source · Erlang/OTP ssl <11.2.12.7
Open Source · Erlang/OTP ssl 11.2.12.7
Open Source · Erlang/OTP ssl <11.5.4
Open Source · Erlang/OTP ssl 11.5.4

Get alerted to advisories like this

OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.

Start free trial Learn more