WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

Erlang/OTP Flaw Hits OT Networks in Major Exploit Wave

Erlang/OTP Flaw Hits OT Networks in Major Exploit Wave

A critical vulnerability in Erlang/OTP’s SSH implementation, CVE-2025-32433, has been actively exploited since May, mainly targeting operational technology (OT) networks. The flaw allows remote code execution via the SSH daemon, potentially granting attackers full host access. 

Erlang/OTP is widely used in high-availability systems like banking, telecom, and industrial automation. Palo Alto Networks reported a surge in attacks from May 1–9, with 70% aimed at OT environments, especially in the U.S. 

The vulnerability affects unpatched SSH servers using Erlang/OTP. It was patched in OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. CISA added it to its Known Exploited Vulnerabilities catalog on June 9. 

Palo Alto found exposed services on ports like TCP 2222 and noted that 85% of attacks targeted healthcare, agriculture, media, and tech sectors. Malicious payloads included reverse shells and botnet-linked communications. Hundreds of vulnerable services remain exposed across industrial networks. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.