Erlang Security Advisory - Critical Vulnerabilities Addressed

Significant risk — action recommended within 24-48 hours
Basically, Erlang found security flaws in their software that need urgent fixes.
Erlang's latest security advisory reveals critical vulnerabilities in its software. Users must update to secure versions to protect their systems from potential exploits. Don't delay in applying these necessary fixes!
What Happened
On April 7, 2026, Erlang released a security advisory identified as AV26-320. This advisory highlights significant vulnerabilities affecting several of its products, specifically targeting the inets, OTP, Public_key, and ssl modules.
The Flaw
The vulnerabilities include:
- OCSP designated-responder authorization bypass: This flaw arises from missing signature verification as outlined in RFC 6960 §4.2.2.2.
- ScriptAlias CGI targets bypass: This issue involves a mismatch between
mod_authandmod_cgipath, allowing unauthorized access.
These vulnerabilities could potentially allow attackers to bypass security measures, leading to unauthorized access or exploitation of the affected systems.
What's at Risk
The affected products are widely used in various applications, and the flaws could compromise the integrity and security of systems relying on these modules. Users running outdated versions are particularly at risk, as they may be vulnerable to attacks exploiting these weaknesses.
Patch Status
Erlang has recommended updates for the affected products:
- inets (OTP): Versions prior to 9.1.0.6, 9.3.2.4, and 9.6.2
- OTP: Versions prior to 28.4.2, 27.3.4.10, and 26.2.5.19
- Public_key (OTP): Versions prior to 1.17.1.2 and 1.20.3
- ssl (OTP): Versions prior to 11.2.12.7 and 11.5.4
Users are urged to apply these updates immediately to mitigate risks associated with these vulnerabilities.
Immediate Actions
To protect your systems, follow these steps:
- Check your current versions of the affected Erlang products.
- Update to the latest secure versions as recommended in the advisory.
- Review security configurations to ensure they align with best practices.
- Monitor your systems for any unusual activity that might indicate exploitation attempts.
By taking these actions, users can significantly reduce their exposure to potential threats stemming from these vulnerabilities.
🔍 How to Check If You're Affected
- 1.Verify the version of Erlang products in use.
- 2.Check for any unusual access patterns or anomalies in logs.
- 3.Ensure that all recommended patches are applied.
🔒 Pro insight: The identified vulnerabilities could lead to significant security breaches if not patched promptly, particularly in environments relying heavily on Erlang's OTP framework.