Malicious actors had been taking benefit of the present patched important safety flaws which might be already affecting Ellan/Open Telecom Platform (OTP) SSH by the start of Might 2025, with round 70% of detections defending operational expertise (OT) networks that defend firewalls.
The vulnerability in query is CVE-2025-32433 (CVSS rating: 10.0). This lacks authentication points that may very well be abused by attackers by community entry to an Arlang/OTP SSH server and operating arbitrary code. Patches had been utilized in variations OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20 in April 2025.
Then, in June 2025, the US Cybersecurity and Infrastructure Safety Company (CISA) added a flaw to its recognized exploited vulnerabilities (KEV) catalog based mostly on proof of energetic exploitation.
“On the coronary heart of Erlang/OTP’s safe communication capabilities are native SSH implementations answerable for encrypted connections, file transfers and, most significantly, command execution,” stated Palo Alto Networks Unit 42 researchers Adam Robbie, Yiheng AN, Malav Vyas, Cecilia Hu, Matthew Tennis, and Zhanhao Chen.
“This flaw in implementation permits attackers with community entry to execute arbitrary code on susceptible programs with out the necessity for credentials, presenting direct and severe dangers to uncovered belongings.”
An evaluation of cybersecurity corporations’ telemetry knowledge revealed that over 85% of exploiting makes an attempt primarily elected healthcare, agriculture, media, leisure and high-tech sectors such because the US, Canada, Brazil, India and Australia.

The noticed assault follows the profitable exploitation of CVE-2025-32433 adopted by risk actors utilizing reverse shells to realize unauthorized distant entry to the goal community. It’s presently unknown who’s behind the efforts.
“This intensive publicity at this industry-specific port illustrates the vital international assault floor of your entire OT community,” Unit 42 stated. “Analyses of affected industries present the variance of assaults.”
“Attackers are attempting to use vulnerabilities with short-term high-strength bursts. They’re disproportionately focusing on OT networks and making an attempt to entry uncovered providers in each IT and industrial ports.”