Patch now! Attacks on Erlang/OTP SSH may be imminent

SSH servers with Erlang/OTP SSH can be attacked via a critical vulnerability with a maximum rating. Security patches are available.

listen Print view

(Image: solarseven/Shutterstock.com)

2 min. read

Because exploit code for a “critical” vulnerability in Erlang/OTP SSH is in circulation, attacks could occur in the near future. If attackers successfully exploit the vulnerability, they can compromise systems after executing malicious code.

The Erlang/OTP SSH libraries allow developers to add SSH client and server functionality to applications written in the Erlang programming language for remote access.

A warning message indicates that the vulnerability (CVE-2025-32433) is classified with the highest possible CVSS score of 10 out of 10. Attacks should be possible remotely without authentication.

In an article, the discoverers of the vulnerability from Ruhr University Bochum state that all applications that use Erlang/OTP SSH are probably at risk. The security problem lies in the processing of SSH protocol messages. At this point, attackers can send connection protocol messages before authentication.

Videos by heise

This can then lead to DoS states. However, malicious code can also get onto systems. Attackers can then execute the code with the rights of the SSH daemon. If this runs with root rights, the consequences are fatal.

Exploit code is now in circulation that attackers can use to attack computers. So far, there are no reports that attackers have already exploited the vulnerability. However, this could change quickly.

Admins should ensure that one of the secure versions is installed: OTP-27.3.3, OTP-26.2.5.11 or OTP-25.3.2.20. If it is not possible to install a patch immediately, SSH access should be restricted via firewall rules.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.