Thursday, May 8, 2025
HomeCVE/vulnerabilityPoC Released for Critical Erlang/OTP SSH RCE Vulnerability

PoC Released for Critical Erlang/OTP SSH RCE Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Security teams across industries are urgently patching systems following the public release of a proof-of-concept (PoC) exploit for a newly disclosed critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation.

The flaw, tracked as CVE-2025-32433 and assigned a maximum CVSS score of 10.0, enables unauthenticated attackers to execute arbitrary code, potentially taking complete control of affected systems.

The vulnerability, disclosed by a team of researchers in April 2025, stems from improper SSH protocol message handling within Erlang/OTP.

- Advertisement - Google News

By sending specially crafted connection protocol messages before authentication, attackers can trigger the flaw and execute code remotely—without needing any credentials.

“This is a particularly dangerous issue because all versions of Erlang/OTP running its SSH server component are affected, regardless of the underlying version,” warned experts.

Erlang/OTP is widely deployed in critical infrastructure, including telecom networks, IoT, and operational technology (OT) environments, vastly increasing the risk surface.

Researchers from Horizon3’s Attack Team confirmed that they successfully reproduced CVE-2025-32433 and developed a working PoC exploit:
“Just finished reproducing CVE-2025-32433 and putting together a quick PoC exploit — surprisingly easy. Wouldn’t be shocked if public PoCs start dropping soon. If you’re tracking this, now’s the time to take action,” Horizon3 posted to social media.

On April 17, an anonymous security researcher posted PoC code for the vulnerability on Pastebin, making it accessible to threat actors worldwide.

Security experts describe the exploit as “surprisingly easy,” heightening fears of imminent mass exploitation.

The severity of CVE-2025-32433 cannot be overstated. Commands executed through exploitation run with the privileges of the SSH daemon—often root—meaning successful attacks could result in full system compromise, data theft, or the deployment of ransomware.

Mitigation and Remediation

The Erlang/OTP project responded quickly, releasing patches for all supported branches:

  • OTP-27.3.3
  • OTP-26.2.5.11
  • OTP-25.3.2.20

Organizations unable to patch immediately should:

  • Restrict SSH port access using firewalls
  • Disable Erlang/OTP’s SSH server if not essential
  • Limit access to trusted IP addresses only

“All organizations should identify any deployment of Erlang/OTP SSH services and prioritize immediate patching,” security experts urge.

With a working exploit now public and the vulnerability trivial to exploit, the window for safe remediation is closing swiftly.

Exposure to this critical flaw could result in rapid, widespread attacks. Immediate action is essential to protect critical infrastructure and prevent devastating cyber incidents.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...