Erlang/OTP’s SSH Flaw: Malicious Actors Get Creative with Code Execution Comedy
Malicious actors are playing peekaboo with a patched Erlang/OTP SSH flaw, CVE-2025-32433, scoring a perfect 10 in vulnerability severity. They’ve been busy since May 2025, cozying up to firewalls like unwanted houseguests. While the flaw was patched, attackers are still trying to crash the party, impacting sectors from healthcare to agriculture.

Hot Take:
Well, it looks like Erlang/OTP’s secure communication got lost in translation when it came to keeping bad actors out! The CVE-2025-32433 flaw is making hackers feel like they’re in a candy store, and it seems like they’re not big on sharing. Who knew that a missing authentication issue could be the hottest ticket of 2025? Perhaps Erlang needs a new OTP: One Tough Password!
Key Points:
- CVE-2025-32433 is a critical security flaw in Erlang/OTP SSH with a perfect 10.0 CVSS score.
- The flaw allows for unauthenticated arbitrary code execution on vulnerable systems.
- Malicious exploitation started in May 2025, despite a patch released in April 2025.
- 70% of exploit detections are from firewalls in OT networks, with sectors like healthcare and agriculture being prime targets.
- CISA added the vulnerability to its KEV catalog in June 2025 due to active exploitation evidence.
Already a member? Log in here