{"id":"CVE-2020-35733","details":"An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.","modified":"2026-05-18T05:51:08.615750409Z","published":"2021-01-15T14:15:14.803Z","related":["openSUSE-SU-2024:10740-1","openSUSE-SU-2025:15740-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"33"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CXZWUOZELT7A5ZN6DJRQHX7L35V4PW/"},{"type":"ADVISORY","url":"https://erlang.org/pipermail/erlang-questions/2021-January/100357.html"},{"type":"ADVISORY","url":"https://github.com/erlang/otp/releases"},{"type":"ADVISORY","url":"https://www.erlang.org/downloads"},{"type":"ADVISORY","url":"https://www.erlang.org/news"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"1a7dc7ad22b089a01b253432484983fd6e141103"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"23.2.2"}]}}],"versions":["OTP-23.0","OTP-21.0","OTP-23.2","OTP-22.0","OTP-23.2.1","OTP-23.1","OTP-23.0-rc3","OTP-23.0-rc2","OTP-23.0-rc1","OTP-20.0","OTP-22.0-rc3","OTP-22.0-rc2","OTP-22.0-rc1","OTP-19.0","OTP-21.0-rc2","OTP-18.0","OTP-21.0-rc1","OTP-17.0","OTP-20.0-rc2","OTP-20.0-rc1","OTP-19.0-rc2","OTP-19.0-rc1","OTP_R16B","OTP-18.0-rc1","OTP_17.0-rc2","OTP_17.0-rc1","OTP_R13B03","OTP_R16A_RELEASE_CANDIDATE","OTP_R14B03","OTP_R15B","OTP_R15A","OTP_R14B02","OTP_R14B01","OTP_R14B","OTP_R13B04","OTP_R14A"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35733.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}