Erlang/OTP SSH: Unauthenticated remote code execution in Erlang/OTP SSH server (CVE-2025-32433) #shorts

Summary

Welcome to today’s security brief. We’re looking at CVE‑2025‑32433, a critical remote code execution vulnerability in the Erlang/OTP SSH server. Public proof‑of‑concept exploits are already circulating, making it imperative for administrators to act now.

Product details

The issue affects Erlang/OTP SSH implementations shipped with OTP releases prior to 27.3.3, 26.2.5.11, and 25.3.2.20. Erlang/OTP is a set of libraries and runtime components used for building scalable, fault‑tolerant systems. The vulnerability was reported by GitHub_M and published on April 16, 2025.

Vulnerability type summary

This flaw falls under CWE‑306: Missing Authentication for Critical Function. In essence, the SSH server did not properly enforce authentication before processing certain protocol messages, allowing unauthenticated attackers to trigger code execution.

Details of the vulnerability

An attacker sends crafted SSH protocol messages that bypass authentication checks in the Erlang/OTP SSH daemon. By exploiting a flaw in message handling, they can execute arbitrary commands on the target system without valid credentials. Proof‑of‑concept code is publicly available, and several threat actors are already testing exploits in the wild. The issue is fixed in OTP‑27.3.3, OTP‑26.2.5.11, and OTP‑25.3.2.20. Until you can update, disable the SSH server or block its port via firewall rules.

Conclusion

CVE‑2025‑32433 poses a severe risk for any organization running affected Erlang/OTP SSH servers. With public exploits out, patching to the latest OTP release should be your top priority. Disable or shield the SSH service until you can apply the update, and monitor logs for any suspicious connection attempts.

Watch the full video on YouTube: CVE-2025-32433

Remediation and exploitation details

This chain involves the following actors

This following systems are involved

Attack entry point

Remediation actions

Exploitation actions

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2025-32433
Description
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Provider
GitHub_M
CWE / problem types
CWE-306: Missing Authentication for Critical Function
Affected Software Versions
erlang:otp:[{'version': '>= OTP-27.0-rc1, < OTP-27.3.3', 'status': 'affected'}, {'version': '>= OTP-26.0-rc1, < OTP-26.2.5.11', 'status': 'affected'}, {'version': '< OTP-25.3.2.20', 'status': 'affected'}]
Date Published
2025-04-16T21:34:37.457Z
Last Updated
2025-04-25T23:03:01.788Z