⚠ Actively exploited
Added to CISA KEV on 2025-06-09. Federal agencies required to patch by 2025-06-30. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-32433
Severity
10.0CRITICAL
EPSS
53.6%
top 2.01%
CISA KEV
KEV
Added 2025-06-09
Due 2025-06-30
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 16
KEV addedJun 9
KEV dueJun 30
Latest updateAug 27
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary w…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages13 packages
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
2Nuclei▶
Erlang/OTP SSH - Remote Code Execution
🔍Detection Rules
4Suricata▶
ET EXPLOIT SSH Erlang/OTP SSH Server Unencryped Channel Request (Message Type 98) (CVE-2025-32433)↗2025-04-22
📋Vendor Advisories
7CISA
▶
Cisco▶
Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025↗2025-04-22