Skip to content

Critical Erlang SSH Vulnerability Exploited in OT Networks, Patch Now

Act now to protect your OT networks. Unpatched Erlang SSH servers are under attack, with 70% of exploitation attempts targeting OT sectors.

In this image there is a remote on a wooden surface. There are numbers, text and symbols on the...
In this image there is a remote on a wooden surface. There are numbers, text and symbols on the remote.

Critical Erlang SSH Vulnerability Exploited in OT Networks, Patch Now

A severe remote code execution (RCE) vulnerability, CVE-2025-32433, exists in Erlang's Open Telecom Platform (OTP) Secure Shell daemon (sshd). The vulnerability allows unauthenticated attackers to execute commands by sending specific SSH messages before authentication. Organizations are urged to patch immediately.

Temporary measures include disabling the SSH server or restricting access via firewall rules. There has been a surge in exploitation attempts between May 1 and May 9, with 70% of detections originating from firewalls protecting operational technology (OT) networks. Organizations should upgrade to OTP 27.3.3, OTP 26.2.5.11, or OTP 25.3.2.20 to mitigate the risk. Attackers have been observed deploying payloads that establish reverse shells for unauthorized access. Erlang/OTP services are widely exposed on the internet, sometimes over industrial ports like TCP 2222, creating a crossover risk between IT and industrial control systems. Many targeted sectors rely on Erlang/OTP's native SSH for remote administration, including healthcare, agriculture, media and entertainment, and high technology.

Exploitation of this vulnerability could result in full system control, compromise of sensitive information, and additional host compromises within the network. Organizations are advised to patch immediately and review their network security measures to prevent unauthorized access.

Read also:

Latest