First published: Wed Apr 16 2025(Updated: )
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang/OTP | <27.3.3<26.2.5.11<25.3.2.20 | |
debian/erlang | <=1:23.2.6+dfsg-1+deb11u1<=1:25.2.3+dfsg-1<=1:27.3.2+dfsg-1 | 1:27.3.3+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32433 is classified as a high severity vulnerability due to its potential for unauthenticated remote code execution.
To fix CVE-2025-32433, update your Erlang/OTP installation to versions 27.3.3, 26.2.5.11, or 25.3.2.20 or later.
CVE-2025-32433 is a remote code execution vulnerability that affects the SSH server functionality in Erlang/OTP.
CVE-2025-32433 affects Erlang/OTP versions prior to 27.3.3, 26.2.5.11, and 25.3.2.20.
If CVE-2025-32433 is exploited, an attacker could execute arbitrary code on the server without authentication.