Erlang/OTP SSH Vulnerability - 20250811001¶
Overview¶
A critical vulnerability has been identified that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorised access to affected systems and execute arbitrary commands without valid credentials.
Due to Erlang/OTP being a set of libraries for the Erlang programming language, it is incorporated in multiple products which may be in use without being initially obvious. The WASOC recommends administrators review the list of affected products to determine if this affects their environment.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE | CVSS | Severity |
---|---|---|---|---|
Erlang/OTP SSH | 27.x prior to OTP-27.3.3 26.x prior to OTP-26.2.5.11 25.x prior to OTP-25.3.2.20 |
CVE-2025-32433 | 10 | Critical |
Cisco | Recommendation link below | Same as above | Same as above | Same as above |
NetApp | Recommendation link below | Same as above | Same as above | Same as above |
What has been observed?¶
The WA SOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):
- Cisco: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy
- NetApp: https://security.netapp.com/advisory/ntap-20250425-0001/