A critical vulnerability (CVE-2025-32433) exists in Erlang/OTP's SSH implementation, affecting versions prior to 26.2.1 and 25.3.2.6. This flaw allows unauthenticated remote attackers to execute arbitrary code on the server. Specifically, a specially crafted SSH message can trigger the vulnerability during the initial handshake, before authentication occurs, enabling complete system compromise. Users are urged to update their Erlang/OTP installations to the latest patched versions as soon as possible.
The post details an exploit targeting the Xbox 360's hypervisor, specifically through a vulnerability in the console's update process. By manipulating the order of CB/CD images on a specially crafted USB drive during a system update, the exploit triggers a buffer overflow in the hypervisor's handling of image metadata. This overflow overwrites critical data, allowing the attacker to gain code execution within the hypervisor itself, effectively bypassing the console's security mechanisms and gaining full control of the system. The post specifically focuses on the practical implementation of the exploit, describing the meticulous process of crafting the malicious update package and the challenges encountered in triggering the vulnerability reliably.
HN commenters discuss the technical details of the Xbox 360 hypervisor exploit, praising the author's clear explanation of a complex topic. Several commenters dive into specific aspects like the chosen attack vector, the role of timing, and the intricacies of DMA manipulation. Some express nostalgia for the era of console hacking and the ingenuity involved. Others draw parallels to modern security challenges, highlighting the constant cat-and-mouse game between security researchers and exploit developers. A few commenters also touch upon the legal and ethical considerations of such exploits.
The blog post details a vulnerability in the "todesktop" protocol handler, used by numerous applications and websites to open links directly in desktop applications. By crafting malicious links using this protocol, an attacker can execute arbitrary commands on a victim's machine simply by getting them to click the link. This affects any application that registers a custom todesktop handler without properly sanitizing user-supplied input, including popular chat platforms, email clients, and web browsers. This vulnerability exposes hundreds of millions of users to potential remote code execution attacks. The author demonstrates practical exploits against several popular applications, emphasizing the severity and widespread nature of this issue. They urge developers to immediately review and secure their implementations of the todesktop protocol handler.
Hacker News users discussed the practicality and ethics of the "todesktop" protocol, which allows websites to launch desktop apps. Several commenters pointed out existing similar functionalities like URL schemes and Progressive Web Apps (PWAs), questioning the novelty and necessity of todesktop. Concerns were raised about security implications, particularly the potential for malicious websites to exploit the protocol for unauthorized app launches. Some suggested that proper sandboxing and user confirmation could mitigate these risks, while others remained skeptical about the overall benefit outweighing the security concerns. The discussion also touched upon the potential for abuse by advertisers and the lack of clear benefits compared to existing solutions. A few commenters expressed interest in legitimate use cases, like streamlining workflows, but overall the sentiment leaned towards caution and skepticism due to the potential for malicious exploitation.
Summary of Comments ( 11 )
https://news.ycombinator.com/item?id=43716526
Hacker News users discuss the severity and impact of the Erlang/OTP SSH vulnerability. Some highlight the potential for widespread exploitation given Erlang's usage in telecom infrastructure and distributed systems. Several commenters question the assigned CVSS score of 9.8, finding it surprisingly high for a vulnerability that requires non-default configuration (specifically enabling password authentication). The discussion also touches on the practical implications of the vulnerability, acknowledging that while serious, exploitation might be limited by the need for open SSH ports and enabled password logins. Others express concern about the potential for nested exploitation, as vulnerable Erlang systems might host other exploitable services. Finally, some users note the responsible disclosure and patching process.
The Hacker News post titled "Unauthenticated Remote Code Execution in Erlang/OTP SSH" (https://news.ycombinator.com/item?id=43716526) has several comments discussing the vulnerability (CVE-2025-32433).
Several commenters highlight the severity of the vulnerability, being an unauthenticated remote code execution flaw. One user points out the particularly dangerous combination of this being a pre-auth vulnerability and Erlang's frequent use in distributed systems, increasing the potential attack surface. They mention that distributed Erlang systems often run with minimal firewalling, making them easier targets.
Another commenter notes that exploitation is straightforward, quoting the NIST advisory that "Successful exploitation of this vulnerability requires only sending a crafted SSH message." This emphasizes the low barrier to entry for potential attackers.
Discussion also revolves around the practical impact. One user questions how many publicly exposed Erlang SSH servers exist, suggesting that while serious, the impact might be limited depending on the prevalence of such deployments. This prompts another commenter to mention that while direct SSH access to Erlang nodes might be less common, many systems likely use distributed Erlang for backend communication, which could be vulnerable.
A commenter with experience in securing Erlang systems suggests that the vulnerability reinforces the importance of employing robust network security measures, like firewalls and VPNs, even within internal networks. They highlight that assuming internal networks are safe is a dangerous misconception.
There's some discussion of the technical details. One user dives deeper into the mechanism of the vulnerability, explaining that it arises from the way the
ssh_packet_set_size/1
function handles size limits before authentication, allowing malicious actors to bypass checks and execute arbitrary code.Finally, several commenters express concern about the vulnerability's potential to affect critical infrastructure and industrial control systems, given Erlang's presence in those sectors. One user speculates about the potential for this vulnerability to be exploited in targeted attacks.