CVE-2025-32433
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Analysis
Erlang/OTP SSH server allows unauthenticated remote code execution by exploiting a flaw in SSH protocol message handling, enabling unauthorized system access with CVSS 10.0.
Technical Context
The CWE-306 flaw in SSH protocol message handling allows an attacker to send SSH messages before authentication completes. The SSH server processes these pre-auth messages in a way that enables arbitrary Erlang code execution, which translates to OS command execution.
Affected Products
['Erlang/OTP before OTP-27.3.3', 'Erlang/OTP before OTP-26.2.5.11', 'Erlang/OTP before OTP-25.3.2.20']
Remediation
Update Erlang/OTP immediately. Identify all services using Erlang SSH (RabbitMQ, CouchDB, ejabberd, etc.). Restrict SSH port access. Monitor for exploitation attempts.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today