Security Bulletin text on the screen with a wolf in the background
Security Bulletin text on the screen with a wolf in the background

CVE-2025-32433: Maximum Severity Unauthenticated RCE Vulnerability in Erlang/OTP SSH

On 16 April 2025, fixes were released for a maximum severity vulnerability in Erlang/OTP SSH, CVE-2025-32433.
Security Bulletin text on the screen with a wolf in the background
6 min read

On 16 April 2025, fixes were released for a maximum severity vulnerability in Erlang/OTP SSH, CVE-2025-32433. Erlang/OTP SSH is a library within the Erlang/OTP platform, typically used in telecommunications, messaging, IoT, and distributed applications. CVE-2025-32433 allows unauthenticated remote threat actors to achieve remote code execution (RCE) in the SSH daemon. The issue arises due to a flaw in SSH protocol message handling, which permits the sending of protocol messages before authentication. 

If the SSH daemon is running with elevated privileges, such as root, threat actors can gain full control of the affected device, potentially leading to a complete system compromise. This could result in unauthorised access to sensitive data, manipulation of system resources by third parties, or denial-of-service (DoS) attacks. Users running an SSH server based on Erlang/OTP SSH should assume they are affected, especially if it is utilised for remote access. 

A day after the initial disclosure, security researchers posted on X that they were able to easily create an exploit for the vulnerability. On the same day, a technical blog was released by Platform Security along with a public proof-of-concept (PoC) exploit on Github, stating that the information gathered from a post on X was enough to recreate the exploit. 

Potentially Affected Third-Party Software

Based on publicly-available information, the following applications are known to utilise Erlang OTP, which may suggest that they are vulnerable to CVE-2025-32433. This list is provided on a best effort basis, and is not guaranteed to be complete. 

Erlang is widely used in networking equipment that forms the backbone of the internet, and SSH is used to establish secure connections on the control plane managing many of those devices. This supply chain risk extends to industrial control systems (ICS) and operational technology (OT) devices, such as routers, switches, and smart sensors. In 2018, Cisco estimated that 90% of internet traffic transits through Erlang-controlled nodes. 

Please note that specific remediation steps will vary depending on the application affected. To minimise operational impact, please review vendor-specific guidance for remediation of this vulnerability and ensure that upgraded Erlang libraries are fully supported within each affected application. 

Company  Products/Projects  Details 
Ericsson  Various Ericsson products intended for fault-tolerant distributed applications including the AXD301 carrier-grade switch.  Ericsson bundles Erlang versions within multiple products, but has not yet published guidance advising on products affected by CVE-2025-32433. 

If your organisation uses Ericsson products in your environment, check with the vendor directly to determine the full scope of affected products. 

Cisco  Network Services Orchestrator 

Ultra Cloud Platform 

ConfD 

Cisco bundles Erlang versions within multiple products, but has not yet published guidance advising on products affected by CVE-2025-32433. 

See product documentation for additional details, and check with the vendor directly to determine the full scope of affected products. 

National Instruments  SystemLink Server 

LabVIEW NXG Web Module 

FlexLogger 

LabVIEW NXG 

LabVIEW Application Builder Module 

Package Manager 

Requires separate installation of Erlang OTP. 
Broadcom  RabbitMQ (Open Source)  Requires separate installation of Erlang OTP. 

See the following resources for more details: 

EMQ Technologies  EQMX (Open Source)  Depends on Erlang OTP 25, but no specific version specified. 

See the following resource for more details: https://docs.emqx.com/en/emqx/latest/deploy/install-source.html#dependencies 

Very Technology  Nerves (Open Source)  Requires separate installation of Erlang OTP. 
Apache Software Foundation  Apache CouchDB (Open Source)  Requires separate installation of Erlang OTP. 
Riak Technologies  Riak KV (Open Source)  Requires separate installation of Erlang OTP. 

Recommendations for CVE-2025-32433

Upgrade to Latest Fixed Version

Arctic Wolf recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
Erlang OTP 
  • OTP-27.3.2 and prior 
  • OTP-26.2.5.10 and prior 
  • OTP-25.3.2.19 and prior 
  • OTP-27.3.3 
  • OTP-26.2.5.11 
  • OTP-25.3.2.20 

 

Temporary Workaround: For users unable to immediately upgrade to a fixed version, Erlang recommends disabling the SSH server or restricting access using firewall rules. 

Please follow your organisation’s patching and testing guidelines to minimise potential operational impact. 

Monitor Vendor Security Updates

While fixes for Erlang/OTP SSH are now available, the security patch is not automatically applied to software products that use Erlang/OTP SSH. The best method for remediating these vulnerabilities in third-party software products is to apply the official security updates from the vendor of each affected software product. 

Arctic Wolf recommends monitoring software vendor advisories for security updates and applying the available security updates promptly. 

References 

Resources

Understand the threat landscape, and how to better defend your organisation, with the 2025 Arctic Wolf Threat Report

See how Arctic Wolf utilises threat intelligence to harden your attack surface and stop threats earlier and faster

 

Share this post: