4:44pm, 24 April 2025
TLP Rating:
CVE-2025-32433 affecting Erlang/Open Telecom Platform (OTP) SSH library
The NCSC would like to draw your attention to a critical vulnerability affecting Erlang/OTP SSH. This vulnerability has been given a CVSS score of 10. Erlang is widely used in networking equipment, which introduces supply chain risk, particularly to industrial control systems (ICS) and operational technology (OT) devices.
CVE-2025-32433 is a remote code execution (RCE) vulnerability affecting the Erlang/Open Telecom Platform (OTP) SSH library. This could allow a remote attacker to send connection protocol messages prior to authentication, resulting in arbitrary code execution in the SSH daemon. The NCSC is aware of published Proof of Concept (PoC) exploits.
What's happening
Systems affected
The vulnerability affects devices running the following versions of Erlang/OTP SSH daemon:
• OTP-27.3.2 and prior.
• OTP-26.2.5.10 and prior.
• OTP-25.3.2.19 and prior.
What this means
Organisations are vulnerable to this CVE if they are running the affected versions listed or use third party software that uses Erlang/OTP SSH.
What to look for
How to tell if you're at risk
Organisations are vulnerable to this CVE if they are running the affected versions listed or use third party software that uses Erlang/OTP SSH.
How to tell if you're affected
All users running the Erlang/OTP SSH server are impacted by this vulnerability, regardless of the underlying Erlang/OTP version. If your application provides SSH access using the Erlang/OTP SSH library, assume you are affected.
If you’re unsure whether you are affected by this vulnerability, please contact your software provider.
What to do
Prevention
The NCSC encourages organisations in New Zealand that use the affected product to review the advisory External Link and apply the remediation as soon as possible. The NCSC also recommends organisations monitor for security updates from third-party vendors that use Erlang/OTP SSH.
Mitigation
Update: Users are advised to update to OTP-27.3.3 (for OTP-27), OTP-26.2.5.11 (for OTP-26), or OTP-25.3.2.20 (for OTP-25) to mitigate this issue.
Temporary Workaround: Until upgrading to a fixed version, we recommend disabling the SSH server or to prevent access via firewall rules.
More information
If you require more information or further support, submit a report on our website or contact us on 0800 CERTNZ.
Report an incident to CERT NZ External Link .
For media enquiries, email our media desk at media@ncsc.govt.nz.
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.