Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Trump administration will stop illegal freezes of $5 billion EV charger funds after losing in court

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall
Identity

Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall

userBy userAugust 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 11, 2025Ravi LakshmananVulnerability/Network Security

erlang/otp ssh rce exploits

Malicious actors were taking advantage of the current patched critical security flaws that are already affecting Ellan/Open Telecom Platform (OTP) SSH by the beginning of May 2025, with around 70% of detections protecting operational technology (OT) networks that protect firewalls.

The vulnerability in question is CVE-2025-32433 (CVSS score: 10.0). This lacks authentication issues that could be abused by attackers by network access to an Arlang/OTP SSH server and running arbitrary code. Patches were applied in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20 in April 2025.

Then, in June 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) added a flaw to its known exploited vulnerabilities (KEV) catalog based on evidence of active exploitation.

“At the heart of Erlang/OTP’s secure communication capabilities are native SSH implementations responsible for encrypted connections, file transfers and, most importantly, command execution,” said Palo Alto Networks Unit 42 researchers Adam Robbie, Yiheng AN, Malav Vyas, Cecilia Hu, Matthew Tennis, and Zhanhao Chen.

Identity Security Risk Assessment

“This flaw in implementation allows attackers with network access to execute arbitrary code on vulnerable systems without the need for credentials, presenting direct and serious risks to exposed assets.”

An analysis of cybersecurity companies’ telemetry data revealed that over 85% of exploiting attempts primarily elected healthcare, agriculture, media, entertainment and high-tech sectors such as the US, Canada, Brazil, India and Australia.

The observed attack follows the successful exploitation of CVE-2025-32433 followed by threat actors using reverse shells to gain unauthorized remote access to the target network. It is currently unknown who is behind the efforts.

“This extensive exposure at this industry-specific port illustrates the important global attack surface of the entire OT network,” Unit 42 said. “Analyses of affected industries show the variance of attacks.”

“Attackers are trying to exploit vulnerabilities with short-term high-strength bursts. They are disproportionately targeting OT networks and trying to access exposed services in both IT and industrial ports.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNvidia announces infrastructure for use in new Cosmos World Models, Robotics and Physical
Next Article New Tetra Radio Encryption Flaws Expose Law Enforcement Communications
user
  • Website

Related Posts

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

August 11, 2025

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

August 11, 2025

BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More

August 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Trump administration will stop illegal freezes of $5 billion EV charger funds after losing in court

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.