Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Cuts Power Needs for AI Queries 33x in One Year

    Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

    How Sakana AI’s new evolutionary algorithm builds powerful AI models without expensive retraining

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Former Indian Politician Convicted in Bitcoin Extortion Case

      August 30, 2025

      Top 3 Real World Asset (RWA) Altcoins to Watch in September

      August 30, 2025

      Ethereum Dip May Be Temporary with $1 Billion Whale Buys and Slower Profit Taking

      August 30, 2025

      Everything We Know So Far About the Bitcoin Thriller “Killing Satoshi”

      August 30, 2025

      Why HBAR’s Bearish Sentiment Might Be Its Trigger for a Price Rebound

      August 30, 2025
    • Technology

      Google Cuts Power Needs for AI Queries 33x in One Year

      August 30, 2025

      Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

      August 30, 2025

      How Sakana AI’s new evolutionary algorithm builds powerful AI models without expensive retraining

      August 30, 2025

      How Intuit killed the chatbot crutch – and built an agentic AI playbook you can copy

      August 30, 2025

      OpenAI–Anthropic cross-tests expose jailbreak and misuse risks — what enterprises must add to GPT-5 evaluations

      August 30, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn
    Technology

    A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn

    TechAiVerseBy TechAiVerseApril 18, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn – so patch now

    (Image credit: Shutterstock)

    • Security researchers find a 10/10 flaw in Erlang/OTP SSH
    • Horizon3 Attack Team says the flaw is “surprisingly easy” to exploit
    • A patch is available, so users should update now

    Erlang/OTP SSH, a set of libraries for the Erlang programming language, carries a maximum-severity vulnerability that allows for remote code execution and is “surprisingly easy” to exploit, researchers are warning.

    A team of cybersecurity researchers from the Ruhr University Bochum (Germany) recently discovered an improper handling of pre-authentication protocol messages flaw, which affects all versions of Erlang/OTP SSH. It is tracked as CVE-2025-32433 and carries a severity score of 10/10 (critical).

    Erlang/OTP SSH is a module within the Erlang/OTP standard library that provides support for implementing Secure Shell (SSH) clients and servers in Erlang applications.

    Remote code execution

    Erlang is a functional programming language and runtime system designed for building highly concurrent, distributed, and fault-tolerant systems. It was originally developed by Ericsson, for use in telecoms, but has expanded into messaging systems, databases, and other applications where uptime and scalability are critical.

    “The issue is caused by a flaw in the SSH protocol message handling which allows an attacker to send connection protocol messages prior to authentication,” a warning on the OpenWall vulnerability mailing list reads.

    Soon after the news broke, security researchers from the Horizon3 Attack Team tried to reproduce the flaw and found it to be “surprisingly easy”, which should be cause for concern.

    “Just finished reproducing CVE-2025-32433 and putting together a quick PoC exploit — surprisingly easy,” the team said on X. “Wouldn’t be shocked if public PoCs start dropping soon. If you’re tracking this, now’s the time to take action.”

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Taking action would mean applying the patch which is now available and which mitigates the risk. Since all older versions are vulnerable, all users are advised to upgrade to versions 25.3.2.10 and 26.2.4.

    Threat actors are more active in the short window between a patch being released, and being applied by the users. Most organizations are not that diligent when it comes to patching, giving cybercriminals a relatively easy exploit avenue.

    Via BleepingComputer

    You might also like

    • OpenSSH vulnerabilities could pose huge threat to businesses everywhere
    • Take a look at our guide to the best authenticator app
    • We’ve rounded up the best password managers

    Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous Article$1.26 Billion Bitcoin Unstaking Slashes Babylon’s TVL and BABY Token Value
    Next Article HP agrees million-dollar settlement over “false advertising” on PCs, keyboards
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Google Cuts Power Needs for AI Queries 33x in One Year

    August 30, 2025

    Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

    August 30, 2025

    How Sakana AI’s new evolutionary algorithm builds powerful AI models without expensive retraining

    August 30, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025166 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202528 Views
    Don't Miss
    Technology August 30, 2025

    Google Cuts Power Needs for AI Queries 33x in One Year

    Google Cuts Power Needs for AI Queries 33x in One Year Key Takeaways Energy Consumption…

    Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

    How Sakana AI’s new evolutionary algorithm builds powerful AI models without expensive retraining

    How Intuit killed the chatbot crutch – and built an agentic AI playbook you can copy

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Google Cuts Power Needs for AI Queries 33x in One Year

    August 30, 20252 Views

    Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

    August 30, 20252 Views

    How Sakana AI’s new evolutionary algorithm builds powerful AI models without expensive retraining

    August 30, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.