Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3491-1 | erlang security update |
EUVD |
EUVD-2022-39680 | In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS. |
Ubuntu USN |
USN-6059-1 | Erlang vulnerability |
Tue, 27 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-27T18:19:43.782Z
Reserved: 2022-07-29T00:00:00.000Z
Link: CVE-2022-37026
Updated: 2024-08-03T10:21:32.690Z
Status : Modified
Published: 2022-09-21T14:15:11.223
Modified: 2025-05-27T19:15:22.210
Link: CVE-2022-37026
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN