Featured resource
Forrester Wave Report 2025
Pluralsight named a Leader in the Forrester Wave™

Our tech skill development platform earned the highest scores possible across 11 criteria.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know

CVE‑2025‑32433 is a critical, CVSS 10.0 vulnerability that lets an unauthenticated attacker run arbitrary code through Erlang/OTP’s built‑in SSH server.

Matthew Lloyd Davies - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
by Matthew Lloyd Davies
Michael Teske - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
by Michael Teske

What you'll learn

Erlang is a functional language engineered for always‑on, soft real‑time services such as telecom switches, trading engines, and chat platforms. Its Open Telecom Platform (OTP) adds message‑passing middleware, hot‑code upgrades, a distributed database and a full tool‑chain.

On 16  April  2025, it was disclosed that a flaw in the built‑in Erlang/OTP SSH server let an unauthenticated attacker slip a crafted protocol message past the handshake and run arbitrary code. The issue carries a maximum CVSS v3 score of  10.0 and affects all deployments older than OTP‑27.3.3, 26.2.5.11 and 25.3.2.20. Major vendors, including Cisco, have acknowledged exposure, and public scans appeared within days of disclosure.

This course moves quickly from architecture fundamentals to hands‑on defense. You will see the exploit executed in a safe lab, learn how to spot vulnerable nodes in production, apply official patches or temporary mitigations, and adopt secure‑coding habits that harden future Erlang/OTP services. By the end, you’ll be ready to keep high‑availability systems online, even when the next zero‑day drops.

Table of contents

About the authors

Matthew Lloyd Davies - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
Matthew Lloyd Davies

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

More Courses by Matthew
Michael Teske - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
Michael Teske

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

More Courses by Michael