Erlang/OTP’s SSH Flaw: Malicious Actors Get Creative with Code Execution Comedy

Malicious actors are playing peekaboo with a patched Erlang/OTP SSH flaw, CVE-2025-32433, scoring a perfect 10 in vulnerability severity. They’ve been busy since May 2025, cozying up to firewalls like unwanted houseguests. While the flaw was patched, attackers are still trying to crash the party, impacting sectors from healthcare to agriculture.

Pro Dashboard

Hot Take:

Well, it looks like Erlang/OTP’s secure communication got lost in translation when it came to keeping bad actors out! The CVE-2025-32433 flaw is making hackers feel like they’re in a candy store, and it seems like they’re not big on sharing. Who knew that a missing authentication issue could be the hottest ticket of 2025? Perhaps Erlang needs a new OTP: One Tough Password!

Key Points:

  • CVE-2025-32433 is a critical security flaw in Erlang/OTP SSH with a perfect 10.0 CVSS score.
  • The flaw allows for unauthenticated arbitrary code execution on vulnerable systems.
  • Malicious exploitation started in May 2025, despite a patch released in April 2025.
  • 70% of exploit detections are from firewalls in OT networks, with sectors like healthcare and agriculture being prime targets.
  • CISA added the vulnerability to its KEV catalog in June 2025 due to active exploitation evidence.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?