The vulnerability, tracked as CVE-2025-32433 and assigned the maximum possible CVSS score of 10.0, allows attackers to execute arbitrary code without authentication, potentially leading to complete system compromise.
A team of security researchers publicly disclosed the vulnerability in April 2025. The flaw exists in the SSH protocol message handling mechanism, enabling attackers to send connection protocol messages before authentication is completed.
The issue is caused by a flaw in the SSH protocol message handling, allowing an attacker to send connection protocol messages prior to authentication. This vulnerability affects all versions of Erlang/OTP running an SSH server component, regardless of the underlying version.
Security researchers at Horizon3’s Attack Team have already reproduced the vulnerability and developed a proof-of-concept exploit. In a concerning development, they described the vulnerability as “surprisingly easy” to exploit.
Just finished reproducing CVE-2025-32433 and putting together a quick PoC exploit, surprisingly easy. Wouldn’t be shocked if public PoCs start dropping soon. If you’re tracking this, now’s the time to take action, Horizon3 posted to social media.
The ease of exploitation has raised alarms among security professionals, with concerns that widespread attacks could emerge rapidly once public exploits become available.
An anonymous security researcher has released proof-of-concept code for CVE-2025-32433 on Pastebin.
This vulnerability is particularly dangerous because Erlang is widely deployed in critical infrastructure, including telecom equipment from major vendors, as well as IoT and operational technology (OT) environments.
Security experts have described the vulnerability as “extremely critical” and warned that it could allow threat actors to perform actions such as installing ransomware or stealing sensitive data.
Any commands executed through exploitation will run with the same privileges as the SSH daemon. Since these daemons commonly run as root, successful attacks could result in complete system takeover.
The Erlang/OTP team has released patches for affected versions. Organizations should immediately upgrade to the following patched versions:
For systems that cannot be immediately updated, security experts recommend implementing workarounds such as:
This vulnerability allows malicious actors with network access to hosts running an Erlang/OTP SSH server to execute unauthenticated remote code. The severity of the vulnerability and the confirmation of working exploits make immediate action essential.
Organizations are urged to identify all systems running Erlang/OTP SSH services and prioritize patching.
With confirmation that the vulnerability is easily exploitable and the likelihood of public exploits appearing imminently, the window for remediation is rapidly closing for organizations with vulnerable systems exposed.
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy
The post PoC Exploit Released for Erlang/OTP SSH Remote Code Execution Vulnerability appeared first on Cyber Security News.
Upcoming action movie prequel John Rambo has reportedly added James Franco to its cast. Details…
In the Grey is now playing in theaters. Jake Gyllenhaal and Henry Cavill met in…
At SIM 2026 in Porto, João Rui Ferreira, Secretary of State for the Economy, announced the…
At SIM 2026 in Porto, João Rui Ferreira, Secretary of State for the Economy, announced the…
This website uses cookies.