Количество 8
Количество 8

CVE-2025-32433
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

CVE-2025-32433
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

CVE-2025-32433
CVE-2025-32433
Erlang/OTP is a set of libraries for the Erlang programming language. ...

SUSE-SU-2025:1357-1
Security update for erlang

BDU:2025-04706
Уязвимость реализации протокола SSH из набора библиотек Erlang/OTP, связанная с отсутствием проверки подлинности для критически важной функции, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2025:1356-1
Security update for erlang26

ROS-20250430-05
Множественные уязвимости erlang
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-32433 Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules. | CVSS3: 10 | 70% Высокий | 2 месяца назад |
![]() | CVE-2025-32433 Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules. | CVSS3: 10 | 70% Высокий | 2 месяца назад |
![]() | CVSS3: 10 | 70% Высокий | около 2 месяцев назад | |
CVE-2025-32433 Erlang/OTP is a set of libraries for the Erlang programming language. ... | CVSS3: 10 | 70% Высокий | 2 месяца назад | |
![]() | SUSE-SU-2025:1357-1 Security update for erlang | 70% Высокий | около 2 месяцев назад | |
![]() | BDU:2025-04706 Уязвимость реализации протокола SSH из набора библиотек Erlang/OTP, связанная с отсутствием проверки подлинности для критически важной функции, позволяющая нарушителю выполнить произвольный код | CVSS3: 10 | 70% Высокий | 2 месяца назад |
![]() | SUSE-SU-2025:1356-1 Security update for erlang26 | около 2 месяцев назад | ||
![]() | ROS-20250430-05 Множественные уязвимости erlang | CVSS3: 10 | около 2 месяцев назад |
Уязвимостей на страницу