Description

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

INFO

Published Date :

2025-04-16T21:34:37.457Z

Last Modified :

2026-02-26T18:28:12.084Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-32433 vulnerability.

Vendors Products
Cisco
  • Cloud Native Broadband Network Gateway
  • Confd Basic
  • Enterprise Nfv Infrastructure Software
  • Inode Manager
  • Ncs 1001
  • Ncs 1002
  • Ncs 1004
  • Ncs 2000 Shelf Virtualization Orchestrator Firmware
  • Ncs 2000 Shelf Virtualization Orchestrator Module
  • Network Services Orchestrator
  • Optical Site Manager
  • Rv160
  • Rv160 Firmware
  • Rv160w
  • Rv160w Firmware
  • Rv260
  • Rv260 Firmware
  • Rv260p
  • Rv260p Firmware
  • Rv260w
  • Rv260w Firmware
  • Rv340
  • Rv340 Firmware
  • Rv340w
  • Rv340w Firmware
  • Rv345
  • Rv345 Firmware
  • Rv345p
  • Rv345p Firmware
  • Smart Phy
  • Staros
  • Ultra Cloud Core
  • Ultra Packet Core
  • Ultra Services Platform
Debian
  • Debian Linux
Erlang
  • Erlang\/otp
  • Otp

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact