Article Details
Scrape Timestamp (UTC): 2025-04-17 21:38:38.691
Original Article Text
Click to Toggle View
Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now. A critical vulnerability in the Erlang/OTP SSH, tracked as CVE-2025-32433, has been disclosed that allows for unauthenticated remote code execution on vulnerable devices. The flaw was discovered by Fabian Bäumer, Marcus Brinkmann, Marcel Maehren, and Jörg Schwenk of the Ruhr University Bochum in Germany and given a maximum severity score of 10.0. All devices running the Erlang/OTP SSH daemon are impacted by the vulnerability and are advised to upgrade to versions 25.3.2.10 and 26.2.4 to fix the flaw. Erlang is a programming language known for its fault-tolerance and concurrency, making it commonly used in telecom infrastructure and high -availability systems. Erlang/OTP is a set of libraries, design principles, and tools built on top of Erlang that provides components like the SSH application for remote access. The CVE-2025-32433 vulnerability is caused by the improper handling of certain pre-authentication protocol messages within the SSH daemon provided by Erlang/OTP's SSH application. "The issue is caused by a flaw in the SSH protocol message handling which allows an attacker to send connection protocol messages prior to authentication," reads a disclosure on the OpenWall vulnerability mailing list. Any commands executed through the vulnerability will be run with the same privileges as the SSH daemon. In many cases, the daemon runs as root, which would allow attackers to fully compromise the system. Horizon3's Attack Team, known for their exploit research, warned on X that they had reproduced the flaw and found it "surprisingly easy," demonstrating a PoC that writes a file as root on affected systems. "Just finished reproducing CVE-2025-32433 and putting together a quick PoC exploit — surprisingly easy. Wouldn't be shocked if public PoCs start dropping soon. If you're tracking this, now's the time to take action," Horizon3 posted to X. Organizations are strongly advised to upgrade to the fixed versions immediately before a PoC becomes public and the flaw is mass-exploited. For systems, such as industrial or mission-critical devices that can't be easily updated, it is advised that access to SSH be restricted to trusted IPs, or the SSH daemon should be turned off if not needed.
Daily Brief Summary
A critical flaw, CVE-2025-32433, in Erlang/OTP SSH allows unauthenticated remote code execution.
The vulnerability was identified by researchers from Ruhr University Bochum in Germany, receiving a severity score of 10.0.
Vulnerable systems include all devices operating the Erlang/OTP SSH daemon, with urgent updates advised.
Erlang's widespread use in telecom and high-availability systems highlights the significant impact of this vulnerability.
The flaw arises from incorrect handling of pre-authentication protocol messages in the SSH daemon.
Attackers exploiting this vulnerability can execute commands with the same privileges as the SSH daemon, often with root access.
Horizon3's Attack Team demonstrated a "surprisingly easy" proof of concept, emphasizing the urgency of applying patches.
For systems that cannot be immediately updated, restricting SSH access or disabling the SSH daemon is recommended.