On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-32433

Erlang SSH Chainbreaker: How CVE‑2025‑32433 Enables Pre‑Auth RCE

Vulnerability Overview 

CVE ID: CVE-2025-32433 

CVE Title: Erlang/OTP SSH — Preauthentication Remote Code Execution 

Severity: Critical  

Exploit Status: Public proofofconcept(s) and observed exploitation in the wild 

Business Risk:  

  • Unauthenticated full host compromise (commands run with the SSH daemon’s privileges, frequently root). 
  • Lateral movement, data theft, persistence, or service disruption on infrastructure that exposes Erlang/OTP’s SSH service (including network and OT devices). 
  • Broad supplychain exposure where thirdparty products embed vulnerable OTP builds.

Summary

A logic bug in Erlang/OTP’s SSH server allowed certain SSH connection messages to be accepted before authentication completed. Attackers can send crafted preauth packets (e.g., open/channel_request with an exec payload) that the server processes and executes, enabling remote command execution without credentials. Patched OTP releases are available; public PoCs, exploit modules, and active scanning/exploitation were reported soon after disclosure.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-32433?

Technical Overview

How Does the CVE-2025-32433 Exploit Work?

The attack typically follows these steps:

CVE-2025-32433 Exploitation Process

What Causes CVE-2025-32433?

Vulnerability Root Cause:  

A logic bug in Erlang/OTP’s SSH lets the server accept channel_open/channel_request messages before login, so an attacker can send preauth commands that the server executes (e.g., via os:cmd) without credentials.

How Can You Mitigate CVE-2025-32433?

If immediate patching is delayed or not possible:  

  • Block network access to vulnerable Erlang SSH servers if patching is not possible. 
  • Disable the SSH server on systems where it is not required. 
  • Restrict access to trusted management networks or VPNs. 
  • Apply vendor-specific updates and downstream fixes where available. 
  • Monitor for pre-auth SSH channel activity and suspicious Erlang process commands. 
  • Increase logging to detect SSH messages sent before authentication. 
  • Investigate and isolate any exposed or vulnerable hosts. 
  • Test mitigations only in controlled lab environments.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-32433 Cause Downtime?

Patch application impact: Low. Update Erlang/OTP to patched versions; rebuild and restart SSH. Downtime is minimal during maintenance. 

Mitigation (if immediate patching is not possible): Limit network access to the Erlang SSH port using firewalls or security groups. This reduces exposure but does not fully prevent attacks. Systems remain at risk until patched.

How Can You Detect CVE-2025-32433 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Alert triggers:

Remediation & Response

Mitigation Steps if No Patch:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score10.0Critical severity; allows unauthenticated remote code execution
Attack VectorNetworkExploitable remotely via SSH without local access
Attack ComplexityLowExploit does not require special conditions; straightforward RCE
Privileges RequiredNoneNo authentication or elevated privileges needed to execute code
User Interaction NoneNo user action required; exploitation occurs remotely
Scope Changed Successful exploitation can affect the entire host if SSH runs as root
Confidentiality Impact HighExploit can disclose sensitive data or system information
Integrity ImpactHighExploit can modify system state or execute arbitrary commands
Availability ImpactHighFull system compromise possible; DoS likely during exploitation

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.