A critical Erlang / OTP security defect is “surprisingly easy” to exploit, warns experts – so patch now


  • Security researchers find a 10/10 flaw in Erlang / OTP SSH
  • The horizon3 attack team says that the defect is “surprisingly easy” to exploit
  • A fix is ​​available, so users must update now

Erlang / OTP SSH, a set of libraries for the Erlang programming language, bears a vulnerability of maximum severity which allows the execution of the remote code and is “surprisingly easy” to exploit, the researchers warn.

A team of cybersecurity researchers from Ruhr Bochum University (Germany) recently discovered poor manipulation of messages from the Flaw pre-authentication protocol, which affects all versions of Erlang / OTP SSH. It is followed as CVE-2025-32433 and carries a gravity score of 10/10 (criticism).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top