Security researchers find a 10/10 error in Erlang/OTP SSH
Horizon3 Attack Team says the error is “surprisingly easy” to take advantage of
A patch is available so users need to update now
Erlang/OTP SSH, a set of libraries for Erlang programming language, bears a vulnerability in the maximum severity that allows for the performance of remote code and is “surprisingly easy” to exploit researchers warn.
A team of cybersecurity scientists from Ruhr University Bochum (Germany) recently discovered the incorrect handling of pre-authentication protocol message errors affecting all versions of Erlang/OTP SSH. It is traced as CVE-2025-32433 and has a severity of 10/10 (critical).