A critical vulnerability has been uncovered in the Erlang/OTP SSH library, raising concerns about the potential takeover of various devices. Erlang/OTP, a set of tools designed for creating high availability systems, is at risk due to this newly discovered flaw. Researchers from Ruhr University Bochum in Germany identified the vulnerability, which has been assigned a CVSS score of 10.
The vulnerability, known as CVE-2025-32433, revolves around the handling of SSH protocol messages. This flaw allows attackers to send connection protocol messages before authentication, opening the door for potential exploitation. The researchers caution that all SSH servers utilizing the Erlang/OTP SSH library could be impacted, particularly those used for remote access.
According to the researchers, this vulnerability could enable attackers to execute arbitrary code within the context of the SSH daemon. If the SSH daemon is operating as root, the attacker could gain full access to the device, potentially leading to a complete compromise of the host. This could result in unauthorized access to sensitive data, manipulation by third parties, or denial-of-service attacks.
To address this critical issue, patches have been released in OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. Additionally, users can implement firewall rules as a temporary workaround to thwart potential attacks. Mayuresh Dani, a researcher at Qualys, highlighted the severity of the vulnerability, warning that it could allow remote attackers to install ransomware or extract sensitive information.
Erlang, widely used in high-availability systems for its concurrent processing support, is prevalent in devices from companies like Cisco and Ericsson. This means that a significant number of devices, including OT/IoT devices and edge computing devices, could be vulnerable to exploitation if they utilize the Erlang/OTP SSH library for remote access.
The discovery of this vulnerability underscores the importance of proactive security measures and prompt patching of software. As cyber threats continue to evolve, it is crucial for organizations and individuals to stay vigilant and ensure that their systems are protected against potential vulnerabilities.
This latest development serves as a reminder of the constant battle against cyber threats and the importance of staying informed about emerging vulnerabilities. By taking proactive steps to address security issues and staying abreast of the latest developments in cyber security, organizations can better safeguard their systems and data from potential attacks.

