CVE-2026-23943

Published: March 13th, 2026
Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
Unknown
CVSS v2:

Status

DocFilters Release Package State Justification Comment
0.0.0.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
26.1.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
26.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.4 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.3 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.2 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.1.2 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.1.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
25.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.4 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.4.0 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.3 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.2.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.2 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
24.1 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
23.3 zlib (1.3) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
23.2.1 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
23.2 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
23.1 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
22.4 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
22.3 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
22.2 zlib (1.2.12) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
22.1 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.11.1 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.11 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.8.1 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.8 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.5.1 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.5.0 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
21.2.0 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.20 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.19.3667 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.18.3599 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.17 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.16.3445 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.15.3368 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.14.3263 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.13.3179 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.12.3054 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.11.3040 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.11.2990 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.10.2934 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.9.2878 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.
11.4.8.2822 zlib (1.2.11) Not Affected Code Not Present CVE-2026-23943 is a compression bomb vulnerability in Erlang OTP’s SSH implementation, not in the zlib library. The issue is that Erlang’s ssh_transport.erl calls zlib decompression without validating the decompressed output size. Document Filters does not use Erlang/OTP, does not include any Erlang runtime or SSH implementation, and does not have any SSH transport code. The vulnerability was flagged by scanning tools because Erlang uses zlib, but the actual flaw is in Erlang’s application code, not in zlib’s inflate functions.

Severity score breakdown

References