TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2025-32433

CRITICALCISA KEV
10.0

Beschreibung

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

CVE Details

CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/16/2025
Zuletzt geandert11/4/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerErlang
ProduktErlang/OTP
SchwachstellennameErlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability
KEV Aufnahmedatum2025-06-09
Behebungsfrist2025-06-30
Ransomware-NutzungUnknown

Betroffene Produkte

cisco:cloud_native_broadband_network_gatewaycisco:confd_basiccisco:enterprise_nfv_infrastructure_softwarecisco:inode_managercisco:ncs_1001cisco:ncs_1002cisco:ncs_1004cisco:ncs_2000_shelf_virtualization_orchestrator_firmwarecisco:ncs_2000_shelf_virtualization_orchestrator_modulecisco:network_services_orchestratorcisco:optical_site_managercisco:rv160cisco:rv160_firmwarecisco:rv160wcisco:rv160w_firmwarecisco:rv260cisco:rv260_firmwarecisco:rv260pcisco:rv260p_firmwarecisco:rv260wcisco:rv260w_firmwarecisco:rv340cisco:rv340_firmwarecisco:rv340wcisco:rv340w_firmwarecisco:rv345cisco:rv345_firmwarecisco:rv345pcisco:rv345p_firmwarecisco:smart_phycisco:staroscisco:ultra_cloud_corecisco:ultra_packet_corecisco:ultra_services_platformdebian:debian_linuxerlang:erlang\/otp

Schwachen (CWE)

CWE-306

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.