Erlang/OTP SSH RCE Exploits Targeting OT Firewalls
Summary
Hide ▲
Show ▼
A surge in exploitation of CVE-2025-32433, a critical security flaw in Erlang/OTP SSH, has been observed since May 2025. Approximately 70% of these exploits target operational technology (OT) firewalls. This vulnerability, patched in April 2025, allows attackers to execute arbitrary code on vulnerable systems without authentication. The attacks have primarily affected healthcare, agriculture, media, entertainment, and high technology sectors in the U.S., Canada, Brazil, India, Australia, Japan, the Netherlands, Ireland, and France. The exploitation involves using reverse shells to gain unauthorized remote access to target networks. The specific threat actors behind these efforts remain unidentified. The flaw is due to improper state enforcement in the Erlang/OTP SSH daemon, allowing unauthenticated clients to execute commands by sending SSH connection protocol messages to open SSH ports. The flaw has been exploited to create TCP connections and bind them to a shell, allowing interactive command execution over the network. The flaw could have severe consequences on an organization, their network, and operations, including the compromise of sensitive information and disruption of operations.
Timeline
-
11.08.2025 18:08 2 articles · 1mo ago
Surge in Erlang/OTP SSH Exploits Targeting OT Firewalls
The flaw is due to improper state enforcement in the Erlang/OTP SSH daemon, allowing unauthenticated clients to execute commands by sending SSH connection protocol messages to open SSH ports. The flaw has been exploited to create TCP connections and bind them to a shell, allowing interactive command execution over the network. The flaw has been exploited to initiate reverse shells using Bash's interactive mode and redirect the shell's input and output to a remote host. The flaw has been exploited to target OT networks in the US, Japan, the Netherlands, Ireland, Brazil, Ecuador, and France. The flaw could have severe consequences on an organization, their network, and operations, including the compromise of sensitive information and disruption of operations. The flaw could negatively impact large portions of the population if exploited in critical infrastructure. The financial impact from severe OT events could top $300 billion. Threat actors have quickly adopted this exploit in active campaigns, underscoring the urgency for organizations to improve protections.
Show sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
Information Snippets
-
CVE-2025-32433 is a critical missing authentication flaw in Erlang/OTP SSH with a CVSS score of 10.0.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The vulnerability allows attackers with network access to execute arbitrary code on vulnerable systems without credentials.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
Patches were released in April 2025: OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
CISA added CVE-2025-32433 to its Known Exploited Vulnerabilities catalog in June 2025.
First reported: 11.08.2025 18:081 source, 1 articleShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
-
Exploits have primarily targeted healthcare, agriculture, media, entertainment, and high technology sectors.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The attacks involve using reverse shells to gain unauthorized remote access to target networks.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The affected regions include the U.S., Canada, Brazil, India, and Australia.
First reported: 11.08.2025 18:082 sources, 2 articlesShow sources
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls — thehackernews.com — 11.08.2025 18:08
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw is due to improper state enforcement in the Erlang/OTP SSH daemon.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw allows unauthenticated clients to execute commands by sending SSH connection protocol messages to open SSH ports.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw has been exploited to create TCP connections and bind them to a shell, allowing interactive command execution over the network.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw has been exploited to initiate reverse shells using Bash's interactive mode and redirect the shell's input and output to a remote host.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw has been exploited to target OT networks in the US, Japan, the Netherlands, Ireland, Brazil, Ecuador, and France.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw could have severe consequences on an organization, their network, and operations, including the compromise of sensitive information and disruption of operations.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The flaw could negatively impact large portions of the population if exploited in critical infrastructure.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
The financial impact from severe OT events could top $300 billion.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
Threat actors have quickly adopted this exploit in active campaigns, underscoring the urgency for organizations to improve protections.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
-
Mitigation strategies include patching, updating intrusion prevention systems, monitoring environments for signs of compromise, disabling the SSH server, and using firewall rules to restrict access.
First reported: 13.08.2025 19:361 source, 1 articleShow sources
- Patch Now: Attackers Target OT Networks via Critical RCE Flaw — www.darkreading.com — 13.08.2025 19:36
Similar Happenings
Clop extortion campaign targets Oracle E-Business Suite
Executives at multiple companies received extortion emails claiming that sensitive data was stolen from their Oracle E-Business Suite systems. The campaign began on or before September 29, 2025, and is linked to the Clop ransomware gang. The emails were sent from hundreds of compromised accounts, some previously associated with the FIN11 threat group. The emails contain contact addresses known to be listed on the Clop ransomware gang's data leak site. The extortion emails are part of a "high-volume email campaign" launched from compromised accounts. The campaign began in late September 2025 and is linked to the Clop ransomware gang. The emails were sent from compromised accounts, some previously associated with the FIN11 threat group. The emails contain contact addresses known to be listed on the Clop ransomware gang's data leak site. Mandiant and GTIG are investigating the claims and recommend that organizations receiving these emails investigate their environments for unusual access or compromise in their Oracle E-Business Suite platforms.
UNC5174 Exploits VMware Zero-Day Privilege Escalation Since October 2024
A China-linked threat actor, UNC5174, has been exploiting a zero-day privilege escalation vulnerability in VMware products since mid-October 2024. The flaw, CVE-2025-41244, affects multiple VMware products and allows local attackers to escalate privileges to root on affected virtual machines. The vulnerability was discovered in May 2025 and patched in VMware Tools 12.4.9 and later versions. The flaw is rooted in the get_version() function, which can be exploited by placing a malicious binary in a writable directory. UNC5174 has been observed using this method to gain elevated access and execute code on compromised systems. The exact payload and nature of the attacks remain unclear. Broadcom has confirmed the patch for the vulnerability in VMware Aria Operations and VMware Tools. NVISO released a proof-of-concept exploit demonstrating privilege escalation on vulnerable VMware software. UNC5174 has been linked to previous attacks on U.S. defense contractors, UK government entities, Asian institutions, and the cybersecurity firm SentinelOne, exploiting vulnerabilities such as F5 BIG-IP CVE-2023-46747 and ConnectWise ScreenConnect flaw. The exploitation of CVE-2025-41244 is considered trivial, potentially benefiting multiple malware strains. NVISO identified the vulnerability in mid-May 2025 during an incident response engagement with UNC5174. Broadcom disclosed three vulnerabilities on September 29, 2025, including CVE-2025-41244. The CVSS severity rating for CVE-2025-41244 is 7.8, classified as high.
ForcedLeak Vulnerability in Salesforce Agentforce Exploited via AI Prompt Injection
A critical vulnerability in Salesforce Agentforce, named ForcedLeak, allowed attackers to exfiltrate sensitive CRM data through indirect prompt injection. The flaw affected organizations using Salesforce Agentforce with Web-to-Lead functionality enabled. The vulnerability was discovered and reported by Noma Security on July 28, 2025. Salesforce has since patched the issue and implemented additional security measures, including regaining control of an expired domain and preventing AI agent output from being sent to untrusted domains. The exploit involved manipulating the Description field in Web-to-Lead forms to execute malicious instructions, leading to data leakage. Salesforce has enforced a Trusted URL allowlist to mitigate the risk of similar attacks in the future. The ForcedLeak vulnerability is a critical vulnerability chain with a CVSS score of 9.4, described as a cross-site scripting (XSS) play for the AI era. The exploit involves embedding a malicious prompt in a Web-to-Lead form, which the AI agent processes, leading to data leakage. The attack could potentially lead to the exfiltration of internal communications, business strategy insights, and detailed customer information. Salesforce is addressing the root cause of the vulnerability by implementing more robust layers of defense for their models and agents.
CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03, mandating federal agencies to identify and mitigate zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) exploited by an advanced threat actor. The directive requires agencies to account for all affected devices, collect forensic data, and upgrade or disconnect end-of-support devices by September 26, 2025. The vulnerabilities allow threat actors to maintain persistence and gain network access. Cisco identified multiple zero-day vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363, and CVE-2025-20352) in Cisco ASA, Firewall Threat Defense (FTD) software, and Cisco IOS software. These vulnerabilities enable unauthenticated remote code execution, unauthorized access, and denial of service (DoS) attacks. GreyNoise detected large-scale campaigns targeting ASA login portals and Cisco IOS Telnet/SSH services, indicating potential exploitation of these vulnerabilities. The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade. CISA and Cisco linked these ongoing attacks to the ArcaneDoor campaign, which exploited two other ASA and FTD zero-days (CVE-2024-20353 and CVE-2024-20359) to breach government networks worldwide since November 2023. CISA ordered agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26. CISA also ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks. The U.K. National Cyber Security Centre (NCSC) confirmed that threat actors exploited the recently disclosed security flaws in Cisco firewalls to deliver previously undocumented malware families like RayInitiator and LINE VIPER. Cisco began investigating attacks on multiple government agencies in May 2025, linked to the state-sponsored ArcaneDoor campaign. The attacks targeted Cisco ASA 5500-X Series devices to implant malware, execute commands, and potentially exfiltrate data. The threat actor modified ROMMON to facilitate persistence across reboots and software upgrades. The compromised devices include ASA 5500-X Series models running specific software releases with VPN web services enabled. The Canadian Centre for Cyber Security urged organizations to update to a fixed version of Cisco ASA and FTD products to counter the threat. Nearly 50,000 Cisco ASA and FTD appliances are vulnerable to actively exploited flaws. The vulnerabilities CVE-2025-20333 and CVE-2025-20362 enable arbitrary code execution and access to restricted URL endpoints. The Shadowserver Foundation discovered over 48,800 internet-exposed ASA and FTD instances still vulnerable to the flaws. The majority of vulnerable devices are located in the United States, followed by the United Kingdom, Japan, Germany, Russia, Canada, and Denmark. The Shadowserver Foundation's data is as of September 29, indicating a lack of response to the ongoing exploitation activity. Greynoise had warned on September 4 about suspicious scans targeting Cisco ASA devices, indicating upcoming undocumented flaws. CISA's emergency directive gave 24 hours to FCEB agencies to identify and upgrade vulnerable Cisco ASA and FTD instances. CISA advised that ASA devices reaching their end of support should be disconnected from federal networks by the end of September. The U.K. NCSC reported that the hackers deployed Line Viper shellcode loader malware and RayInitiator GRUB bootkit.
Cisco IOS and IOS XE SNMP Zero-Day Exploited in Attacks
Cisco has released security updates to address a high-severity zero-day vulnerability (CVE-2025-20352) in Cisco IOS and IOS XE Software. The flaw is a stack-based buffer overflow in the Simple Network Management Protocol (SNMP) subsystem, actively exploited in attacks. This vulnerability allows authenticated, remote attackers to cause denial-of-service (DoS) conditions or gain root control of affected systems. The vulnerability impacts all devices with SNMP enabled, including specific Cisco devices running Meraki CS 17 and earlier. Cisco advises customers to upgrade to a fixed software release, specifically Cisco IOS XE Software Release 17.15.4a, to remediate the vulnerability. Temporary mitigation involves limiting SNMP access to trusted users and disabling the affected Object Identifiers (OIDs) on devices. Additionally, Cisco patched 13 other security vulnerabilities, including two with available proof-of-concept exploit code. Cisco also released patches for 14 vulnerabilities in IOS and IOS XE, including eight high-severity vulnerabilities. Proof-of-concept exploit code exists for two of the vulnerabilities, but exploitation is not confirmed. Three additional medium-severity bugs affect Cisco’s SD-WAN vEdge, Access Point, and Wireless Access Point (AP) software.