By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
Tech News

Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls

By Viral Trending Content 2 Min Read
Share
SHARE

Aug 11, 2025Ravie LakshmananVulnerability / Network Security

Erlang/OTP SSH RCE Exploits

Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as beginning of May 2025, with about 70% of detections originating from firewalls protecting operational technology (OT) networks.

The vulnerability in question is CVE-2025-32433 (CVSS score: 10.0), a missing authentication issue that could be abused by an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code. It was patched in April 2025 with versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.

Then in June 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

“At the heart of Erlang/OTP’s secure communication capabilities lies its native SSH implementation — responsible for encrypted connections, file transfers and most importantly, command execution,” Palo Alto Networks Unit 42 researchers Adam Robbie, Yiheng An, Malav Vyas, Cecilia Hu, Matthew Tennis, and Zhanhao Chen said.

Identity Security Risk Assessment

“A flaw in this implementation would allow an attacker with network access to execute arbitrary code on vulnerable systems without requiring credentials, presenting a direct and severe risk to exposed assets.”

The cybersecurity company’s analysis of telemetry data has revealed that over 85% of exploit attempts have primarily singled out healthcare, agriculture, media and entertainment, and high technology sectors in the U.S., Canada, Brazil, India, and Australia, among others.

In the attacks observed, the successful exploitation of CVE-2025-32433 is followed by the threat actors using reverse shells to gain unauthorized remote access to target networks. It’s currently not known who is behind the efforts.

“This widespread exposure on industrial-specific ports indicates a significant global attack surface across OT networks,” Unit 42 said. “Analysis of affected industries demonstrates variance in the attacks.”

“Attackers are attempting to exploit the vulnerability in short, high-intensity bursts. These are disproportionately targeting OT networks and attempting to access exposed services over both IT and industrial ports.”

You Might Also Like

10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone

File read flaw in Smart Slider plugin impacts 500K WordPress sites

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

Why cybersecurity needs to adapt in the age of AI

A School District Tried to Help Train Waymos to Stop for School Buses. It Didn’t Work

TAGGED: CISA, critical infrastructure, Cyber Security, Cybersecurity, Erlang, Incident response, Internet, network security, Operational Technology, Palo Alto Networks, SSH, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Local Enterprise Offices and Google partner for the ploughing championships
Next Article ZX81 +38 : Modern Features Meet Retro Computing Nostalgia
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone
Tech News
File read flaw in Smart Slider plugin impacts 500K WordPress sites
Tech News
Closing the ‘deterrence gap’: German military association calls for war economy
Business
Chelsea problems on the pitch are clear in recent stats lists – opinion
Sports
Market trading guide: Buy ACME Solar and Dalmia Bharat on Monday for short-term gains up to 16%. Here’s why
Business
EU ministers weigh oil price cap and windfall tax to rein in soaring energy costs
World News
Ethereum builders propose ‘economic zone’ to tackle L2 fragmentation
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone
March 29, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?