Skip to content

Erlang/OTP SSH Vulnerability - 20250811001

Overview

A critical vulnerability has been identified that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorised access to affected systems and execute arbitrary commands without valid credentials.

Due to Erlang/OTP being a set of libraries for the Erlang programming language, it is incorporated in multiple products which may be in use without being initially obvious. The WASOC recommends administrators review the list of affected products to determine if this affects their environment.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
Erlang/OTP SSH 27.x prior to OTP-27.3.3
26.x prior to OTP-26.2.5.11
25.x prior to OTP-25.3.2.20
CVE-2025-32433 10 Critical
Cisco Recommendation link below Same as above Same as above Same as above
NetApp Recommendation link below Same as above Same as above Same as above

What has been observed?

The WA SOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):

Additional References