We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32433

Erlang/OTP SSH Vulnerable to Pre-Authentication RCE



Description

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

Reserved 2025-04-08 | Published 2025-04-16 | Updated 2025-04-25 | Assigner GitHub_M


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

>= OTP-27.0-rc1, < OTP-27.3.3
affected

>= OTP-26.0-rc1, < OTP-26.2.5.11
affected

< OTP-25.3.2.20
affected

References

github.com/...ng/otp/security/advisories/GHSA-37cp-fgq5-7wc2

github.com/...ommit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12

github.com/...ommit/6eef04130afc8b0ccb63c9a0d8650209cf54892f

github.com/...ommit/b1924d37fd83c070055beb115d5d6a6a9490b891

cve.org (CVE-2025-32433)

nvd.nist.gov (CVE-2025-32433)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32433

Support options

Helpdesk Chat, Email, Knowledgebase