TelcoSecSecurity Research
Home
CVE-2025-32433
URGENT

Critical Erlang/OTP SSH RCE vulnerability

Critical CVEs

CVSS 9.0+ vulnerabilities

Research Reports

In-depth vulnerability research

5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

Radio RAN Attacks
Signaling Attacks
SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

PSTN Security

Public Switched Telephone Network vulnerabilities

ADSL Security

Asymmetric Digital Subscriber Line vulnerabilities

HFC Security

Hybrid Fiber-Coaxial network vulnerabilities

DOCSIS Security

Data Over Cable Service Interface vulnerabilities

E1/T1 Security

E1/T1 digital transmission vulnerabilities

SIM Card Security

SIM card vulnerabilities

Mobile Device Security

Mobile device vulnerabilities

Baseband Security

Baseband processor vulnerabilities

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

Home
CVE-2025-32433
URGENT

Critical Erlang/OTP SSH RCE vulnerability

Critical CVEs

CVSS 9.0+ vulnerabilities

Research Reports

In-depth vulnerability research

5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

Radio RAN Attacks
Signaling Attacks
SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

PSTN Security

Public Switched Telephone Network vulnerabilities

ADSL Security

Asymmetric Digital Subscriber Line vulnerabilities

HFC Security

Hybrid Fiber-Coaxial network vulnerabilities

DOCSIS Security

Data Over Cable Service Interface vulnerabilities

E1/T1 Security

E1/T1 digital transmission vulnerabilities

SIM Card Security

SIM card vulnerabilities

Mobile Device Security

Mobile device vulnerabilities

Baseband Security

Baseband processor vulnerabilities

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

  • Home
  • MoTIF
  • Tactics
  • Initial Access
  • Initial Access
    MOTA3003

    The adversary is trying to get into your network

    Phase: Initial Access
    6 Techniques
    18 Sub-techniques
    Previous: Resource Development
    Next: Execution
    Exploit Interconnection Link
    MOT3002
    The adversary may get access to the target network via the interconnection interface.
    2G
    3G
    4G
    Public
    3 sub-techniques
    Exploit via Core Signalling Interface
    MOT3003
    The adversary may access the target network by exploiting signalling (i.e. control plane) protocols.
    2G
    3G
    4G
    Public
    4 sub-techniques
    Exploit via Radio Interface
    MOT3006
    Adversaries may use the radio access network to initiate attacks towards the UE or the mobile network.
    2G
    3G
    4G
    Public
    4 sub-techniques
    Trusted Relationship
    MOT1199
    Adversaries may breach or otherwise leverage organizations who have access to intended victims.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Supply Chain Compromise
    MOT1195
    Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Exploit Management Interface
    MOT3022
    Adversaries may exploit vulnerabilities in management interfaces of telecom equipment to gain initial access.
    2G
    3G
    4G
    Public
    3 sub-techniques
    TelcoSec

    Professional telecommunications security research, penetration testing tools, and vulnerability analysis.

    Security Research

    • Signaling Attacks
    • Diameter Attacks
    • Radio RAN Attacks
    • IMS Attacks
    • VoIP Attacks
    • SIM Card Attacks

    Company

    • About RFS
    • Contact
    • Advertise
    • Partners
    • Privacy Policy
    • Terms of Service

    Partners & Tools

    • Pentesting.pt
    • PopLab Agency
    • Tenable Tools (10% Off)
    • Discord Community

    © 2025 TelcoSec. All rights reserved.

    Professional telecommunications security research by RFS • eJPT, eCPPTv2, CRTP, ADCS CESP, Fortinet (NS1, NS2)

    Standards: GSMA • ENISA • ETSI • NIST • 3GPP