https://security-tracker.debian.org/tracker/source-package/erlang
https://security-tracker.debian.org/tracker/CVE-2026-21620
https://security-tracker.debian.org/tracker/CVE-2026-23941
https://security-tracker.debian.org/tracker/CVE-2026-23942
Severity: High
ID: 315240
File Name: debian_DLA-4590.nasl
Version: 1.1
Type: Local
Agent: unix
Family: Debian Local Security Checks
Published: 5/19/2026
Updated: 5/19/2026
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: High
Base Score: 8.5
Temporal Score: 6.3
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N
CVSS Score Source: CVE-2026-21620
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2026-23942
Risk Factor: High
Base Score: 7
Threat Score: 2.8
Threat Vector: CVSS:4.0/E:U
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L
CVSS Score Source: CVE-2026-23941
CPE: p-cpe:/a:debian:debian_linux:erlang-mode, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:erlang-runtime-tools, p-cpe:/a:debian:debian_linux:erlang-ssh, p-cpe:/a:debian:debian_linux:erlang-jinterface, p-cpe:/a:debian:debian_linux:erlang-erl-docgen, p-cpe:/a:debian:debian_linux:erlang, p-cpe:/a:debian:debian_linux:erlang-manpages, p-cpe:/a:debian:debian_linux:erlang-os-mon, p-cpe:/a:debian:debian_linux:erlang-nox, p-cpe:/a:debian:debian_linux:erlang-common-test, p-cpe:/a:debian:debian_linux:erlang-reltool, p-cpe:/a:debian:debian_linux:erlang-crypto, p-cpe:/a:debian:debian_linux:erlang-observer, p-cpe:/a:debian:debian_linux:erlang-edoc, p-cpe:/a:debian:debian_linux:erlang-x11, p-cpe:/a:debian:debian_linux:erlang-base, p-cpe:/a:debian:debian_linux:erlang-asn1, p-cpe:/a:debian:debian_linux:erlang-snmp, p-cpe:/a:debian:debian_linux:erlang-base-hipe, p-cpe:/a:debian:debian_linux:erlang-parsetools, p-cpe:/a:debian:debian_linux:erlang-xmerl, p-cpe:/a:debian:debian_linux:erlang-et, p-cpe:/a:debian:debian_linux:erlang-eunit, p-cpe:/a:debian:debian_linux:erlang-odbc, p-cpe:/a:debian:debian_linux:erlang-wx, p-cpe:/a:debian:debian_linux:erlang-examples, p-cpe:/a:debian:debian_linux:erlang-doc, p-cpe:/a:debian:debian_linux:erlang-ftp, p-cpe:/a:debian:debian_linux:erlang-eldap, p-cpe:/a:debian:debian_linux:erlang-mnesia, p-cpe:/a:debian:debian_linux:erlang-megaco, p-cpe:/a:debian:debian_linux:erlang-inets, p-cpe:/a:debian:debian_linux:erlang-src, p-cpe:/a:debian:debian_linux:erlang-tftp, p-cpe:/a:debian:debian_linux:erlang-dialyzer, p-cpe:/a:debian:debian_linux:erlang-tools, p-cpe:/a:debian:debian_linux:erlang-diameter, p-cpe:/a:debian:debian_linux:erlang-syntax-tools, p-cpe:/a:debian:debian_linux:erlang-public-key, p-cpe:/a:debian:debian_linux:erlang-ssl, p-cpe:/a:debian:debian_linux:erlang-dev, p-cpe:/a:debian:debian_linux:erlang-debugger
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 5/18/2026
Vulnerability Publication Date: 2/20/2026
CVE: CVE-2026-21620, CVE-2026-23941, CVE-2026-23942, CVE-2026-23943
IAVA: 2026-A-0204-S, 2026-A-0309