← Retour aux CVEs
CVE-2025-32463
CRITICALCISA KEV9.3
Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Details CVE
Score CVSS v3.19.3
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie6/30/2025
Derniere modification11/5/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurSudo
ProduitSudo
Nom vulnerabiliteSudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability
Date ajout KEV2025-09-29
Date limite remediation2025-10-20
Utilise dans ransomwareUnknown
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxopensuse:leapredhat:enterprise_linuxsudo_project:sudosuse:linux_enterprise_desktopsuse:linux_enterprise_real_timesuse:linux_enterprise_server_for_sap
Faiblesses (CWE)
CWE-829
References
https://access.redhat.com/security/cve/cve-2025-32463(cve@mitre.org)
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463(cve@mitre.org)
https://explore.alas.aws.amazon.com/CVE-2025-32463.html(cve@mitre.org)
https://security-tracker.debian.org/tracker/CVE-2025-32463(cve@mitre.org)
https://ubuntu.com/security/notices/USN-7604-1(cve@mitre.org)
https://www.openwall.com/lists/oss-security/2025/06/30/3(cve@mitre.org)
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/(cve@mitre.org)
https://www.sudo.ws/releases/changelog/(cve@mitre.org)
https://www.sudo.ws/security/advisories/(cve@mitre.org)
https://www.sudo.ws/security/advisories/chroot_bug/(cve@mitre.org)
https://www.suse.com/security/cve/CVE-2025-32463.html(cve@mitre.org)
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.