PT-2025-16905 · Ericsson +7 · Erlang/Otp +7

Lambdafu

+1

·

Published

2025-04-16

·

Updated

2025-08-02

·

CVE-2025-32433

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Erlang/OTP versions prior to OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20

Description:

A critical vulnerability in Erlang/OTP's SSH implementation allows unauthenticated remote code execution. This vulnerability is caused by a flaw in the SSH protocol message handling, which enables attackers to send messages before authentication and execute arbitrary commands without valid credentials. The vulnerability affects systems using the SSH library, which is widely deployed in high-availability environments, such as telecom and IoT systems.

Recommendations:

For Erlang/OTP versions prior to OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, update to the latest version (OTP-27.3.3, OTP-26.2.5.11, or OTP-25.3.2.20) to fix the vulnerability.

As a temporary workaround, consider disabling the SSH server or restricting access to it via firewall rules to minimize the risk of exploitation.

Exploit

Fix

RCE

DoS

Missing Authentication

Weakness Enumeration

Related Identifiers

ALT-PU-2025-6402
BDU:2025-04706
CVE-2025-32433
DLA-4132-1
DSA-5906-1
ERLANG_CVE_2025_32433
GHSA-37CP-FGQ5-7WC2
OPENSUSE-SU-2025_1356-1
OPENSUSE-SU-2025_1357-1
SUSE-SU-2025:1356-1
SUSE-SU-2025:1357-1
SUSE-SU-2025_1356-1
SUSE-SU-2025_1357-1
USN-7443-1
USN-7443-2
USN-7443-3

Affected Products

Alt Linux
Astra Linux
Debian
Erlang/Otp
Linuxmint
Red Os
Suse
Ubuntu