{"id":"CVE-2025-32433","summary":"Erlang/OTP SSH Vulnerable to Pre-Authentication RCE","details":"Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.","aliases":["GHSA-37cp-fgq5-7wc2"],"modified":"2026-04-10T05:25:10.486917Z","published":"2025-04-16T21:34:37.457Z","related":["SUSE-SU-2025:1356-1","SUSE-SU-2025:1357-1"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/32xxx/CVE-2025-32433.json","cwe_ids":["CWE-306"]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/16/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/18/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/18/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/18/6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/19/1"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html"},{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32433"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/32xxx/CVE-2025-32433.json"},{"type":"ADVISORY","url":"https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32433"},{"type":"ADVISORY","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250425-0001/"},{"type":"FIX","url":"https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12"},{"type":"FIX","url":"https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f"},{"type":"FIX","url":"https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891"},{"type":"EVIDENCE","url":"https://github.com/ProDefense/CVE-2025-32433/blob/main/CVE-2025-32433.py"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"b74bd21d5cb52e0fdc5ea321439c428783feea23"},{"fixed":"10e20b1dbe39b056fab430e50b08cb4f3696ae87"}],"database_specific":{"versions":[{"introduced":"OTP-27.0-rc1"},{"fixed":"OTP-27.3.3"}]}},{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"127026003180a834e9fa5d5919c824a184faeb92"},{"fixed":"9f6c4eb54823324d1e6f8cb95c15feb09f09044e"}],"database_specific":{"versions":[{"introduced":"OTP-26.0-rc1"},{"fixed":"OTP-26.2.5.11"}]}},{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"fixed":"ae0052c7f891ce805e2b53493a5304e2ee008aeb"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"OTP-25.3.2.20"}]}}],"versions":["OTP-17.0","OTP-18.0","OTP-18.0-rc1","OTP-19.0","OTP-19.0-rc1","OTP-19.0-rc2","OTP-20.0","OTP-20.0-rc1","OTP-20.0-rc2","OTP-21.0","OTP-21.0-rc1","OTP-21.0-rc2","OTP-22.0","OTP-22.0-rc1","OTP-22.0-rc2","OTP-22.0-rc3","OTP-23.0","OTP-23.0-rc1","OTP-23.0-rc2","OTP-23.0-rc3","OTP-24.0","OTP-24.0-rc1","OTP-24.0-rc2","OTP-24.0-rc3","OTP-25.0","OTP-25.0-rc1","OTP-25.0-rc2","OTP-25.0-rc3","OTP-25.1","OTP-25.2","OTP-25.3","OTP-25.3.1","OTP-25.3.2","OTP-25.3.2.1","OTP-25.3.2.10","OTP-25.3.2.11","OTP-25.3.2.12","OTP-25.3.2.13","OTP-25.3.2.14","OTP-25.3.2.15","OTP-25.3.2.16","OTP-25.3.2.17","OTP-25.3.2.18","OTP-25.3.2.19","OTP-25.3.2.2","OTP-25.3.2.3","OTP-25.3.2.4","OTP-25.3.2.5","OTP-25.3.2.6","OTP-25.3.2.7","OTP-25.3.2.8","OTP-25.3.2.9","OTP-26.0","OTP-26.0-rc1","OTP-26.0-rc2","OTP-26.0-rc3","OTP-26.1","OTP-26.2","OTP-26.2.3","OTP-26.2.4","OTP-26.2.5","OTP-26.2.5.1","OTP-26.2.5.10","OTP-26.2.5.2","OTP-26.2.5.3","OTP-26.2.5.4","OTP-26.2.5.5","OTP-26.2.5.6","OTP-26.2.5.7","OTP-26.2.5.8","OTP-26.2.5.9","OTP-27.0","OTP-27.0-rc1","OTP-27.0-rc2","OTP-27.0-rc3","OTP-27.1","OTP-27.2","OTP-27.3","OTP-27.3.1","OTP-27.3.2","OTP_17.0-rc1","OTP_17.0-rc2","OTP_R13B03","OTP_R13B04","OTP_R14A","OTP_R14B","OTP_R14B01","OTP_R14B02","OTP_R14B03","OTP_R15A","OTP_R15B","OTP_R16A_RELEASE_CANDIDATE","OTP_R16B","patch-base-25","patch-base-26"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32433.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}