A critical erlang/otp -s security error is “surprisingly easy” to exploit, experts warn – so patch now


  • Security researchers find a 10/10 error in Erlang/OTP SSH
  • Horizon3 Attack Team says the error is “surprisingly easy” to take advantage of
  • A patch is available so users need to update now

Erlang/OTP SSH, a set of libraries for Erlang programming language, bears a vulnerability in the maximum severity that allows for the performance of remote code and is “surprisingly easy” to exploit researchers warn.

A team of cybersecurity scientists from Ruhr University Bochum (Germany) recently discovered the incorrect handling of pre-authentication protocol message errors affecting all versions of Erlang/OTP SSH. It is traced as CVE-2025-32433 and has a severity of 10/10 (critical).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top