Researchers warn of critical flaw found in Erlang OTP SSH

Researchers warn of critical flaw found in Erlang OTP SSH

Researchers warn of critical flaw found in Erlang OTP SSH

Dive Brief:

  • Security researchers on Monday warned of a critical vulnerability in the Erlang Open Telecom Platform SSH implementation, which could allow an unauthenticated attacker with network access to execute arbitrary code. 
  • The vulnerability, tracked as CVE-2025-32433, has been assigned a CVSS score of 10. If an SSH daemon is running as root, then an attacker has full access to a device, researchers from Ruhr University Bochum said in a post on Openwall. 
  • This level of access could allow third parties to manipulate sensitive data or launch denial-of-service attacks. 

Dive Insight:

This particular vulnerability is considered very high risk, due to the lack of required authentication needed, the ease of exploitation and the wide use in a variety of platforms, according to researchers at Horizon3.ai. 

Users are urged to upgrade to the latest versions. As a temporary workaround, users can disable the SSH server.

Horizon3.ai researchers last Thursday said they were able to quickly reproduce the vulnerability. A detailed proof of concept will not be released until after a patch has been made widely available. 

Erlang OTP is commonly found in IoT devices and telecommunications platforms and is used as a debug utility in other services, including CouchDB and RabbitMQ, Horizon3.ai researchers said. 

The vulnerability could impact a wide range of devices across various OT systems, and devices from Cisco and Ericsson could be affected, according to researchers from Frenos.




Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.