← Volver a CVEs
CVE-2025-32463
CRITICALCISA KEV9.3
Descripcion
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Detalles CVE
Puntuacion CVSS v3.19.3
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/30/2025
Ultima modificacion11/5/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorSudo
ProductoSudo
Nombre vulnerabilidadSudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability
Fecha inclusion KEV2025-09-29
Fecha limite remediacion2025-10-20
Uso en ransomwareUnknown
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxopensuse:leapredhat:enterprise_linuxsudo_project:sudosuse:linux_enterprise_desktopsuse:linux_enterprise_real_timesuse:linux_enterprise_server_for_sap
Debilidades (CWE)
CWE-829
Referencias
https://access.redhat.com/security/cve/cve-2025-32463(cve@mitre.org)
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463(cve@mitre.org)
https://explore.alas.aws.amazon.com/CVE-2025-32463.html(cve@mitre.org)
https://security-tracker.debian.org/tracker/CVE-2025-32463(cve@mitre.org)
https://ubuntu.com/security/notices/USN-7604-1(cve@mitre.org)
https://www.openwall.com/lists/oss-security/2025/06/30/3(cve@mitre.org)
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/(cve@mitre.org)
https://www.sudo.ws/releases/changelog/(cve@mitre.org)
https://www.sudo.ws/security/advisories/(cve@mitre.org)
https://www.sudo.ws/security/advisories/chroot_bug/(cve@mitre.org)
https://www.suse.com/security/cve/CVE-2025-32463.html(cve@mitre.org)
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.