Erlang/OTP SSH Flaw: Patch Now or Brace for Impact!
Erlang/OTP SSH vulnerability CVE-2025-32433 allows remote code execution and could turn your network into an open mic for hackers. Upgrade now or prepare for a comedy of errors. Remember, the only thing worse than a hacker in your system is a hacker with a bad sense of humor.

Hot Take:
Who knew that Erlang, the unsung hero of telecom infrastructure, could also moonlight as a bouncer that lets anyone and everyone into the club? Time to upgrade or face the music of a ‘root’ awakening!
Key Points:
- Critical vulnerability in Erlang/OTP SSH, CVE-2025-32433, allows for unauthenticated remote code execution.
- Flaw discovered by researchers at Ruhr University Bochum with a severity score of 10.0.
- All devices running Erlang/OTP SSH daemon are affected; upgrades to versions 25.3.2.10 and 26.2.4 are recommended.
- Vulnerability arises from improper handling of pre-authentication protocol messages.
- Horizon3’s Attack Team demonstrated a PoC exploit, urging immediate action before mass exploitation occurs.
Already a member? Log in here