TelcoSecSecurity Research
Home
CVE-2025-32433
URGENT

Critical Erlang/OTP SSH RCE vulnerability

Critical CVEs

CVSS 9.0+ vulnerabilities

Research Reports

In-depth vulnerability research

5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

Radio RAN Attacks
Signaling Attacks
SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

PSTN Security

Public Switched Telephone Network vulnerabilities

ADSL Security

Asymmetric Digital Subscriber Line vulnerabilities

HFC Security

Hybrid Fiber-Coaxial network vulnerabilities

DOCSIS Security

Data Over Cable Service Interface vulnerabilities

E1/T1 Security

E1/T1 digital transmission vulnerabilities

SIM Card Security

SIM card vulnerabilities

Mobile Device Security

Mobile device vulnerabilities

Baseband Security

Baseband processor vulnerabilities

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

Home
CVE-2025-32433
URGENT

Critical Erlang/OTP SSH RCE vulnerability

Critical CVEs

CVSS 9.0+ vulnerabilities

Research Reports

In-depth vulnerability research

5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

Radio RAN Attacks
Signaling Attacks
SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

PSTN Security

Public Switched Telephone Network vulnerabilities

ADSL Security

Asymmetric Digital Subscriber Line vulnerabilities

HFC Security

Hybrid Fiber-Coaxial network vulnerabilities

DOCSIS Security

Data Over Cable Service Interface vulnerabilities

E1/T1 Security

E1/T1 digital transmission vulnerabilities

SIM Card Security

SIM card vulnerabilities

Mobile Device Security

Mobile device vulnerabilities

Baseband Security

Baseband processor vulnerabilities

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

MoTIFTechniquesMOT1583
Resource Development
MOT1583

Acquire Infrastructure

Public
2G
3G
4G
View in Matrix
Description

Adversaries may buy, lease, or rent infrastructure that can be used during targeting.

Sub-techniques
Specific variations of this technique
MOT1583.301Core Signalling Infrastructure Access
2G
3G
4G
5G-SA: Theoretical

Adversaries may buy, lease, or rent SS7, Diameter, GTP-C signalling infrastructure access or services that can be used during targeting.

MOT1583.302Radio Interface Access
2G
3G
4G

Adversaries may buy, lease, or obtain physical access to a mobile operator network base station or use their own rogue cellular base station for launching an attack.

MOT1583.303Cloud Infrastructure Access
4G
5G-SA: Demonstrated

Adversaries may acquire cloud infrastructure access to target virtualized network functions (VNFs) in 5G networks.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable
Quick Links
View in MoTIF MatrixView Tactic: Resource DevelopmentAll Techniques
TelcoSec

Professional telecommunications security research, penetration testing tools, and vulnerability analysis.

Security Research

  • Signaling Attacks
  • Diameter Attacks
  • Radio RAN Attacks
  • IMS Attacks
  • VoIP Attacks
  • SIM Card Attacks

Company

  • About RFS
  • Contact
  • Advertise
  • Partners
  • Privacy Policy
  • Terms of Service

Partners & Tools

  • Pentesting.pt
  • PopLab Agency
  • Tenable Tools (10% Off)
  • Discord Community

© 2025 TelcoSec. All rights reserved.

Professional telecommunications security research by RFS • eJPT, eCPPTv2, CRTP, ADCS CESP, Fortinet (NS1, NS2)

Standards: GSMA • ENISA • ETSI • NIST • 3GPP