wid-sec-w-2026-0998
·
Published 2026-04-07
·
View on BSI CERT-Bund ↗
Erlang/OTP: Multiple Vulnerabilities
CVSS 8.3
HIGH
Risk Summary
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Erlang/OTP ausnutzen, um Sicherheitsvorkehrungen zu umgehen und Daten zu manipulieren.
CVEs (3)
Affected Vendors
Open Source
Affected Products (26)
Open Source
·
Erlang/OTP
<28.4.2
Open Source
·
Erlang/OTP
28.4.2
Open Source
·
Erlang/OTP
<27.3.4.10
Open Source
·
Erlang/OTP
27.3.4.10
Open Source
·
Erlang/OTP
<26.2.5.19
Open Source
·
Erlang/OTP
26.2.5.19
Open Source
·
Erlang/OTP
inets <9.1.0.6
Open Source
·
Erlang/OTP
inets 9.1.0.6
Open Source
·
Erlang/OTP
inets <9.3.2.4
Open Source
·
Erlang/OTP
inets 9.3.2.4
Open Source
·
Erlang/OTP
inets <9.6.2
Open Source
·
Erlang/OTP
inets 9.6.2
Open Source
·
Erlang/OTP
kernel <9.2.4.11
Open Source
·
Erlang/OTP
kernel 9.2.4.11
Open Source
·
Erlang/OTP
kernel <10.2.7.4
Open Source
·
Erlang/OTP
kernel 10.2.7.4
Open Source
·
Erlang/OTP
kernel <10.6.2
Open Source
·
Erlang/OTP
kernel 10.6.2
Open Source
·
Erlang/OTP
public key <1.17.1.2
Open Source
·
Erlang/OTP
public key 1.17.1.2
Open Source
·
Erlang/OTP
public key <1.20.3
Open Source
·
Erlang/OTP
public key 1.20.3
Open Source
·
Erlang/OTP
ssl <11.2.12.7
Open Source
·
Erlang/OTP
ssl 11.2.12.7
Open Source
·
Erlang/OTP
ssl <11.5.4
Open Source
·
Erlang/OTP
ssl 11.5.4
Get alerted to advisories like this
OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.
Start free trial Learn more