Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know

CVE‑2025‑32433 is a critical, CVSS 10.0 vulnerability that lets an unauthenticated attacker run arbitrary code through Erlang/OTP’s built‑in SSH server.

Beginner
12m
(2)

Created by Matthew Lloyd Davies and Michael Teske

Last Updated May 16, 2025

Course Thumbnail
  • Course

Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know

CVE‑2025‑32433 is a critical, CVSS 10.0 vulnerability that lets an unauthenticated attacker run arbitrary code through Erlang/OTP’s built‑in SSH server.

Beginner
12m
(2)

Created by Matthew Lloyd Davies and Michael Teske

Last Updated May 16, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Erlang is a functional language engineered for always‑on, soft real‑time services such as telecom switches, trading engines, and chat platforms. Its Open Telecom Platform (OTP) adds message‑passing middleware, hot‑code upgrades, a distributed database and a full tool‑chain.

On 16  April  2025, it was disclosed that a flaw in the built‑in Erlang/OTP SSH server let an unauthenticated attacker slip a crafted protocol message past the handshake and run arbitrary code. The issue carries a maximum CVSS v3 score of  10.0 and affects all deployments older than OTP‑27.3.3, 26.2.5.11 and 25.3.2.20. Major vendors, including Cisco, have acknowledged exposure, and public scans appeared within days of disclosure.

This course moves quickly from architecture fundamentals to hands‑on defense. You will see the exploit executed in a safe lab, learn how to spot vulnerable nodes in production, apply official patches or temporary mitigations, and adopt secure‑coding habits that harden future Erlang/OTP services. By the end, you’ll be ready to keep high‑availability systems online, even when the next zero‑day drops.

Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
Beginner
12m
(2)
Table of contents

About the author
Matthew Lloyd Davies - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
Matthew Lloyd Davies
41 courses 4.7 author rating 47 ratings

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

About the author
Michael Teske - Pluralsight course - Remote Code Execution in Erlang/OTP CVE-2025-32433: What You Should Know
Michael Teske
71 courses 4.5 author rating 888 ratings

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

Get started with Pluralsight