CVE-2025-32433

Name
CVE-2025-32433
Description
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12
MISC https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f
MISC https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891
CONFIRM https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/16/2
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/18/1
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/18/2
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/18/6
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/19/1
134c704f-9b21-4f2e-91b3-4a467353bcc0 https://github.com/ProDefense/CVE-2025-32433/blob/main/CVE-2025-32433.py
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20250425-0001/

Match rules

CPE URI Source package Min version Max version
otp >= OTP-27.0-rc1 < OTP-27.3.3
otp >= OTP-26.0-rc1 < OTP-26.2.5.11
otp >= 0 < OTP-25.3.2.20

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
erlang 3.21-community 26.2.5.11-r0 Celeste <cielesti@protonmail.com> fixed