A critical security vulnerability has been identified in the Erlang/Open Telecom Platform (OTP) SSH implementation, exposing systems to unauthenticated remote code execution. Tracked as CVE-2025-32433, the flaw has received a maximum CVSS severity score of 10.0, highlighting its widespread risk and urgency for immediate action.
🔍 What Is CVE-2025-32433?
According to security researchers Fabian Bäumer, Marcus Brinkmann, Marcel Maehren, and Jörg Schwenk from Ruhr University Bochum, the vulnerability enables threat actors with network access to execute arbitrary code without authentication by exploiting improper handling of SSH protocol messages within Erlang/OTP.
This occurs because the SSH implementation accepts connection protocol messages before authentication is completed, giving attackers an opportunity to hijack the connection and inject malicious code.
⚠️ Why This Vulnerability Is Dangerous
Unauthenticated Exploitation: No credentials required for attack.🛠️ Affected Versions & Patch Recommendations
All systems utilizing the Erlang/OTP SSH library are potentially vulnerable. Immediate action is necessary.
✅ Patched Versions:
OTP-27.3.3OTP-26.2.5.11
If you're unable to upgrade immediately, implement firewall rules to restrict SSH port access to authorized IPs only as a temporary workaround.
🔐 Cybersecurity Best Practices
To minimize your attack surface:
Update immediately to the latest secure Erlang/OTP version.📌 Conclusion
CVE-2025-32433 is a zero-click SSH vulnerability that demands immediate remediation. Organizations using Erlang/OTP must patch or isolate vulnerable systems without delay to prevent potential catastrophic breaches.