NA

CVE-2022-37026

Published: 21/09/2022 Updated: 08/08/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Erlang/OTP prior to 23.3.4.15, 24.x prior to 24.3.4.2, and 25.x prior to 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

erlang erlang\\/otp

Vendor Advisories

Synopsis Moderate: Red Hat OpenStack Platform 1624 (erlang) security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for erlang is now available for Red Hat OpenStack Platform 1624(Train) on Red Hat En ...
Debian Bug report logs - #1024632 erlang: CVE-2022-37026 Client Authentication Bypass Package: erlang; Maintainer for erlang is Debian Erlang Packagers <pkg-erlang-devel@listsaliothdebianorg>; Source for erlang is src:erlang (PTS, buildd, popcon) Reported by: Markus Koschany <apo@debianorg> Date: Tue, 22 Nov 2022 ...