Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

Posted on August 12, 2025August 12, 2025 By CWS

An Erlang/OTP vulnerability whose existence got here to gentle in mid-April has been exploited within the wild, with many assaults apparently focusing on operational expertise (OT) networks.

Erlang/OTP is a set of libraries, middleware and different instruments designed for creating real-time methods that require excessive availability, equivalent to banking, e-commerce, and communications purposes. 

Researchers found that Erlang/OTP’s SSH implementation is affected by a vital vulnerability that may permit arbitrary code execution within the context of the SSH daemon, which might doubtlessly give an attacker full entry to the host, enabling unauthorized entry to and manipulation of delicate knowledge.

Tracked as CVE-2025-32433, the flaw impacts all unpatched SSH servers that leverage the Erlang/OTP SSH library, and methods used for distant entry are notably in danger. 

The safety gap has been patched with the discharge of OTP-27.3.3, OTP-26.2.5.11 and OTP-25.3.2.20. Earlier variations are affected.

The cybersecurity company CISA added CVE-2025-32433 to its Identified Exploited Vulnerabilities catalog on June 9, however there didn’t look like any public experiences describing exploitation of the flaw. 

On Monday, nevertheless, Palo Alto Networks revealed a weblog submit detailing exploitation makes an attempt, which the cybersecurity large has seen since Might 1.

In keeping with Palo Alto Networks, exploitation exercise surged in Might 1-9, with 70% of assaults noticed by the corporate geared toward OT networks. A majority of the detections have been seen in the USA. Commercial. Scroll to proceed studying.

“OT and 5G environments use Erlang/OTP on account of its fault-tolerance and scalability for prime availability methods with minimal downtime,” the safety agency defined. “On account of compliance and security necessities, OT and 5G directors have a tendency to make use of Erlang/OTP’s native SSH implementation to remotely handle hosts, which makes CVE-2025-32433 a specific concern in a lot of these networks.”

Palo Alto Networks has seen Erlang/OTP SSH providers uncovered on the web via varied ports, together with TCP port 2222, which is commonly used for older industrial automation merchandise.

Knowledge collected by the corporate’s firewalls confirmed that 85% of the exploitation makes an attempt have been aimed on the healthcare, agriculture, media and leisure, and excessive tech sectors. 

“Regardless of excessive OT reliance, utilities and power, mining, and aerospace and protection confirmed no direct OT triggers for this particular menace,” Palo Alto stated. “Sectors like skilled and authorized providers primarily noticed triggers on their IT networks. Industries equivalent to manufacturing, wholesale and retail, and monetary providers skilled extra balanced detection throughout each IT and OT, necessitating built-in defenses.” 

The corporate recognized a number of malicious payloads that the attackers tried to ship via the exploitation of CVE-2025-32433, together with reverse shells enabling unauthorized distant entry.

In some instances researchers noticed the usage of a distant host with a port generally related to servers used for botnet communications. 

Scanning performed by Palo Alto confirmed that tons of of Erlang/OTP providers current on industrial networks are uncovered and susceptible to assaults. 

Associated: Cisco Confirms Some Merchandise Impacted by Vital Erlang/OTP Flaw

Associated: Order Out of Chaos – Utilizing Chaos Concept Encryption to Shield OT and IoT

Associated: Honeywell Experion PKS Flaws Enable Manipulation of Industrial Processes

Security Week News Tags:ErlangOTP, Exploitation, Networks, Targeted, Vulnerability, Widespread

Post navigation

Previous Post: Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network
Next Post: Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine

Related Posts

SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Security Week News
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
Counter Antivirus Service AVCheck Shut Down by Law Enforcement Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
O2 Service Vulnerability Exposed User Location Security Week News
Zero Networks Raises $55 Million for Microsegmentation Solution Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Patches Over 60 Vulnerabilities Across 13 Products
  • Microsoft Patches Over 100 Vulnerabilities
  • How to Secure Your Gaming Accounts
  • BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes
  • Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Patches Over 60 Vulnerabilities Across 13 Products
  • Microsoft Patches Over 100 Vulnerabilities
  • How to Secure Your Gaming Accounts
  • BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes
  • Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News