Researchers warn of critical flaw found in Erlang OTP SSH

Researchers warn of critical flaw found in Erlang OTP SSH

Dive Brief:

  • Security researchers on Monday warned of a critical vulnerability in the Erlang Open Telecom Platform SSH implementation, which could allow an unauthenticated attacker with network access to execute arbitrary code. 
  • The vulnerability, tracked as CVE-2025-32433, has been assigned a CVSS score of 10. If an SSH daemon is running as root, then an attacker has full access to a device, researchers from Ruhr University Bochum said in a post on Openwall. 
  • This level of access could allow third parties to manipulate sensitive data or launch denial-of-service attacks. 

Dive Insight:

This particular vulnerability is considered very high risk, due to the lack of required authentication needed, the ease of exploitation and the wide use in a variety of platforms, according to researchers at Horizon3.ai. 

Users are urged to upgrade to the latest versions. As a temporary workaround, users can disable the SSH server.

Horizon3.ai researchers last Thursday said they were able to quickly reproduce the vulnerability. A detailed proof of concept will not be released until after a patch has been made widely available. 

Erlang OTP is commonly found in IoT devices and telecommunications platforms and is used as a debug utility in other services, including CouchDB and RabbitMQ, Horizon3.ai researchers said. 

The vulnerability could impact a wide range of devices across various OT systems, and devices from Cisco and Ericsson could be affected, according to researchers from Frenos.




Source link