PT-2025-16905 · Ericsson +7 · Erlang/Otp +7
Lambdafu
+1
·
Published
2025-04-16
·
Updated
2025-08-02
·
CVE-2025-32433
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Erlang/OTP versions prior to OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20
Description:
A critical vulnerability in Erlang/OTP's SSH implementation allows unauthenticated remote code execution. This vulnerability is caused by a flaw in the SSH protocol message handling, which enables attackers to send messages before authentication and execute arbitrary commands without valid credentials. The vulnerability affects systems using the SSH library, which is widely deployed in high-availability environments, such as telecom and IoT systems.
Recommendations:
For Erlang/OTP versions prior to OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, update to the latest version (OTP-27.3.3, OTP-26.2.5.11, or OTP-25.3.2.20) to fix the vulnerability.
As a temporary workaround, consider disabling the SSH server or restricting access to it via firewall rules to minimize the risk of exploitation.
Exploit
Fix
RCE
DoS
Missing Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 361
- 🔥 https://github.com/ProDefense/CVE-2025-32433/tree/main⭐ 109 🔗 24 · Exploit
- 🔥 https://github.com/ProDefense/CVE-2025-32433/blob/main/CVE-2025-32433.py⭐ 109 🔗 24 · Exploit
- https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f⭐ 11792 🔗 3021 · Patch
- https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12⭐ 11792 🔗 3021 · Patch
- https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2⭐ 11792 🔗 3021 · Vendor Advisory
- https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891⭐ 11792 🔗 3021 · Patch
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26618 · Security Note
- https://ubuntu.com/security/CVE-2025-32433 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-05984 · Security Note
- https://osv.dev/vulnerability/DSA-5906-1 · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-08853 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2025:1357-1 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7443-3 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2025-6402 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-32433 · Vendor Advisory