ID

VAR-202504-1178


CVE

CVE-2025-32433


TITLE

ERLANG  of  Erlang/OTP  Vulnerabilities related to lack of authentication for important functions in products from multiple vendors

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839

DESCRIPTION

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules. ERLANG of Erlang/OTP Products from multiple vendors such as these contain vulnerabilities related to the lack of authentication for important functions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2025-32433 // JVNDB: JVNDB-2025-006839

AFFECTED PRODUCTS

vendor:ciscomodel:confd basicscope:ltversion:8.1.16.2

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:6.4

Trust: 1.0

vendor:erlangmodel:erlang\/otpscope:ltversion:27.3.3

Trust: 1.0

vendor:ciscomodel:ultra packet corescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.7.19.1

Trust: 1.0

vendor:ciscomodel:confd basicscope:ltversion:8.4.4.1

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:6.4.4.1

Trust: 1.0

vendor:ciscomodel:confd basicscope:ltversion:8.2.11.1

Trust: 1.0

vendor:erlangmodel:erlang\/otpscope:gteversion:27.0

Trust: 1.0

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:ltversion:4.18

Trust: 1.0

vendor:ciscomodel:rv340wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:rv345scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:smart physcope:ltversion:25.2

Trust: 1.0

vendor:ciscomodel:confd basicscope:ltversion:8.3.8.1

Trust: 1.0

vendor:ciscomodel:rv160scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:confd basicscope:gteversion:8.3

Trust: 1.0

vendor:ciscomodel:confd basicscope:gteversion:8.2

Trust: 1.0

vendor:erlangmodel:erlang\/otpscope:gteversion:26.0

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.8

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:6.1.16.2

Trust: 1.0

vendor:ciscomodel:rv345pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:6.3.8.1

Trust: 1.0

vendor:ciscomodel:inode managerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ultra cloud corescope:ltversion:2025.03.1

Trust: 1.0

vendor:ciscomodel:rv260scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:6.4.1.1

Trust: 1.0

vendor:ciscomodel:rv160wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:rv260pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:starosscope:eqversion:*

Trust: 1.0

vendor:erlangmodel:erlang\/otpscope:ltversion:25.3.2.20

Trust: 1.0

vendor:ciscomodel:confd basicscope:gteversion:8.4

Trust: 1.0

vendor:ciscomodel:optical site managerscope:ltversion:25.2.1

Trust: 1.0

vendor:ciscomodel:ncs 2000 shelf virtualization orchestratorscope:ltversion:25.1.1

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:6.2.11.1

Trust: 1.0

vendor:ciscomodel:rv340scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:6.3

Trust: 1.0

vendor:ciscomodel:ultra services platformscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:confd basicscope:gteversion:8.0.18

Trust: 1.0

vendor:ciscomodel:confd basicscope:ltversion:7.7.19.1

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:6.4.2

Trust: 1.0

vendor:ciscomodel:rv260wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:6.2

Trust: 1.0

vendor:erlangmodel:erlang\/otpscope:ltversion:26.2.5.11

Trust: 1.0

vendor:ciscomodel:cloud native broadband network gatewayscope:ltversion:2025.03.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco ultra cloud corescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv160 vpn ルータscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco enterprise nfv infrastructure softwarescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco intelligent node managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:confd basicscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ultra packet corescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco cloud native broadband network gatewayscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco optical site managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ultra services platformscope: - version: -

Trust: 0.8

vendor:erlangmodel:erlang/otpscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco network services orchestratorscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ncs 2000 shelf virtualization orchestratorscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco starosscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv260 vpn ルータscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco smart physcope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv160w wireless-ac vpn ルータscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839 // NVD: CVE-2025-32433

CVSS

SEVERITY

CVSSV2

CVSSV3

security-advisories@github.com: CVE-2025-32433
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-006839
value: CRITICAL

Trust: 0.8

security-advisories@github.com: CVE-2025-32433
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-006839
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839 // NVD: CVE-2025-32433

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.0

problemtype:Lack of authentication for critical features (CWE-306) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839 // NVD: CVE-2025-32433

PATCH

title:Top Pageurl:https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839

EXTERNAL IDS

db:NVDid:CVE-2025-32433

Trust: 2.6

db:OPENWALLid:OSS-SECURITY/2025/04/16/2

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2025/04/18/1

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2025/04/19/1

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2025/04/18/6

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2025/04/18/2

Trust: 1.8

db:ICS CERTid:ICSA-25-140-07

Trust: 0.8

db:JVNid:JVNVU96418823

Trust: 0.8

db:JVNDBid:JVNDB-2025-006839

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839 // NVD: CVE-2025-32433

REFERENCES

url:http://www.openwall.com/lists/oss-security/2025/04/16/2

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2025/04/18/1

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2025/04/18/2

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2025/04/18/6

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2025/04/19/1

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20250425-0001/

Trust: 1.8

url:https://github.com/prodefense/cve-2025-32433/blob/main/cve-2025-32433.py

Trust: 1.8

url:https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f

Trust: 1.0

url:https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12

Trust: 1.0

url:https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891

Trust: 1.0

url:https://github.com/erlang/otp/security/advisories/ghsa-37cp-fgq5-7wc2

Trust: 1.0

url:https://jvn.jp/vu/jvnvu96418823/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-32433

Trust: 0.8

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-07

Trust: 0.8

sources: JVNDB: JVNDB-2025-006839 // NVD: CVE-2025-32433

SOURCES

db:JVNDBid:JVNDB-2025-006839
db:NVDid:CVE-2025-32433

LAST UPDATE DATE

2025-06-13T23:00:28.410000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-006839date:2025-06-13T05:39:00
db:NVDid:CVE-2025-32433date:2025-06-12T16:05:19.650

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-006839date:2025-06-13T00:00:00
db:NVDid:CVE-2025-32433date:2025-04-16T22:15:14.373