Loading HuntDB...

CVE-2025-32433

CRITICAL
Published 2025-04-16T21:34:37.457Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-32433. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

Available Exploits

Erlang/OTP SSH - Remote Code Execution

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials.

ID: CVE-2025-32433
Author: iamnoooobrootxharshpdresearchdarses Critical

Related News

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-32433 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability </l…

Cisa.gov 2025-06-09 12:00
CVE-2025-32433: Vulnerability in Erlang/OTP SSH Implementation

Read about a critical vulnerability found in the SSH implementation of Erlang/OTP arising from improper handling of SSH protocol messages. The post CVE-2025-32433: Vulnerability in Erlang/OTP SSH Implementation appeared first on OffSec.

Offsec.com 2025-04-23 14:54
Erlang/OTP Remote Code Execution Vulnerability

A vulnerability has been identified in Erlang/OTP. A remote attacker could exploit some of this vulnerability to trigger remote code execution on the targeted system. Note: Proof Of Concept exploit code is publicly available for CVE-2025-32433. The vuln…

Hkcert.org 2025-04-23 03:00
Critical RCE Vulnerability in Erlang/OTP SSH Server Impacts Multiple Cisco Products

A critical remote code execution (RCE) vulnerability tracked as CVE-2025-32433 has disclosed. This flaw resides in the Erlang/OTP The post Critical RCE Vulnerability in Erlang/OTP SSH Server Impacts Multiple Cisco Products appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-04-23 02:20
PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week. “All users running an SSH server based on the Erlang/OTP SSH library are likely to be affected …

Help Net Security 2025-04-22 12:06

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Due Soon

Due Date

June 30, 2025 (5 days remaining)

Added to KEV

June 9, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Erlang
Product: Erlang/OTP

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.06.09 Released: June 9, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 1 week, 1 day ago
Fun_Tomorrow_8536

CVE-2025-32433 Tenable's plugins STILL don't check for OTP-27.3.3, 26.2.5.11, or 25.3.2.20! This is a CVSS of 10.0 and you are only checking (plugin 234627) versions 4.15, 5.1, and 5.2. I reported this weeks ago, and the tenable team said they couldn't forward it to their own internal team. Customers pay …

Reddit 1 week, 5 days ago
crstux

🔥 Top 10 Trending CVEs (12/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-33070](https://nvd.nist.gov/vuln/detail/CVE-2025-33070)** - 📝 Windows Netlogon Elevation of Privilege Vulnerability - 📅 **Published:** 10/06/2025 - 📈 **CVSS:** 8.1 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 3 - ⚠️ **Priority:** 2 --- **2. …

Reddit 1 week, 6 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (11/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-33053](https://nvd.nist.gov/vuln/detail/CVE-2025-33053)** - 📝 Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability - 📅 **Published:** 10/06/2025 - 📈 **CVSS:** 8.8 - 🛡️ **CISA KEV:** True - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C - …

1
1.0
View Original High Risk
Reddit 2 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (10/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-3721](https://nvd.nist.gov/vuln/detail/CVE-2024-3721)** - 📝 A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation …

2
2.0
View Original High Risk

References

Published: 2025-04-16T21:34:37.457Z
Last Modified: 2025-04-25T23:03:01.788Z
Copied to clipboard!