A critical security defect of Erlang/OTP is “surprisingly easy” to exploit, experts warn, so patch now




  • Security researchers find a 10/10 defect in ERlang/OTP SSH
  • Horizon3’s attack team says that the fault is “surprisingly easy” to explode
  • There is an available patch, so users must now update

ERLANG/OTP SSH, a set of libraries for Erlang’s programming language, entails a maximum severity vulnerability that allows the execution of remote code and is “surprisingly easy” to exploit, researchers warn.

A team of cybersecurity researchers from the University of Ruhr Bochum (Germany) recently discovered inappropriate management of protocol messages prior to authority, which affects all versions of ERlang/OTP SSH. They are traced as CVE-2025-32433 and entails a gravity score of 10/10 (critic).

Leave a Comment

Your email address will not be published. Required fields are marked *