Critical Erlang/OTP SSH Vulnerability Allows Unauthenticated Remote Code Execution
- С сайта: Vulnerability(cybersecuritynews.com)
- Вернуться к списку новостей
Critical Erlang/OTP SSH Vulnerability Allows Unauthenticated Remote Code Execution
Author: KaaviyaA critical vulnerability in the Erlang/Open Telecom Platform (OTP) SSH implementation that allows attackers to execute arbitrary code without authentication.
The flaw, tracked as CVE-2025-32433, has been assigned the maximum CVSS score of 10.0, indicating an extremely severe security risk that requires immediate attention from affected organizations.
The vulnerability was identified by researchers Fabian Bäumer, Marcus Brinkmann, Marcel Maehren, and Jörg Schwenk from Ruhr University Bochum, who disclosed their findings on April 16, 2025.
Erlang/OTP SSH Vulnerability
The team identified a fundamental flaw in the SSH protocol message handling that enables attackers to send connection protocol messages prior to completing authentication procedures.
“The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication.”
The technical details reveal that the vulnerability has been assigned a CVSS vector of CVSS:3.1, indicating a network attack, low complexity for exploitation, and high impacts on confidentiality, integrity, and availability.
Exploitation of CVE-2025-32433 could have devastating consequences, particularly if the SSH daemon is running with elevated privileges.
The advisory warns, “If your SSH daemon is running as root, the attacker has full access to your device. ”
This access could lead to complete system compromise, unauthorized access to sensitive data, or denial-of-service attacks.
The vulnerability poses a significant threat to critical infrastructure, as Erlang is commonly deployed in telecommunications, IoT devices, and high-availability systems.
Risk Factors Details Affected ProductsErlang/OTP SSH Server:- OTP-27.0-rc1 to < OTP-27.3.3- OTP-26.0-rc1 to < OTP-26.2.5.11- All < OTP-25.3.2.20ImpactRemote code execution (RCE), Complete system compromise, Installation of malware or ransomware, Denial of service (DoS)Exploit Prerequisites10.0 (Critical)
Patches Released
All users running SSH servers based on the Erlang/OTP SSH library are affected by this vulnerability.
The Erlang/OTP team has released patched versions: OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. Organizations are strongly advised to update to these versions immediately.
For organizations that cannot immediately deploy the updates, temporary mitigation measures include implementing firewall rules to restrict access to vulnerable SSH servers or disabling the SSH server entirely until a patch can be applied.
Security experts have emphasized the need for urgent action. Researchers noted that this flaw has been classified as highly dangerous, which could enable a threat actor to carry out operations like installing ransomware or stealing confidential information.
The discovery highlights the ongoing challenges in maintaining secure communication protocols, even in well-established implementations like SSH.
It also underscores the importance of regular security updates for infrastructure components that may be deeply embedded in critical systems.
Administrators of any systems using Erlang/OTP SSH implementations should review their deployments immediately and apply the necessary patches or mitigations to protect against this vulnerability.
#Cyber_Security #Cyber_Security_News #Vulnerability #cyber_security #cyber_security_news #vulnerability
Оригинальная версия на сайте: