APromptRiskDBThreat intelligence atlas
AI Vulnerability Context

CVE-2025-32433 - Erlang Erlang/OTP

Erlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). By exploiting a flaw in how SSH protocol messages are handled, a malicious actor could gain unauthorized access to affected systems. This vulnerability could affec...

AI Vulnerability ContextCISA KEVErlang

Record summary

A quick snapshot of what this page covers.

CISA KEVyesWhether CISA lists this as exploited.
Techniques0AI attack methods connected to this vulnerability.
Case studies0Examples where this vulnerability is mentioned.

Vulnerability status

How serious this vulnerability is and whether it is known to be exploited.

CISA KEV
CVE ID
CVE-2025-32433
Vendor/project
Erlang
Product
Erlang/OTP
Vulnerability name
Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability
Date added
2025-06-09
Due date
2025-06-30
Known ransomware campaign use
Unknown
CWE-306

Exploit context

What the vulnerability is about.

Erlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). By exploiting a flaw in how SSH protocol messages are handled, a malicious actor could gain unauthorized access to affected systems. This vulnerability could affect various products that implement Erlang/OTP SSH server, including—but not limited to—Cisco, NetApp, and SUSE.

Source

Where this page information comes from.