9.3

CVE-2025-32463

Warning
Media report
Exploit

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
Sudo ProjectSudo Version >= 1.9.14 < 1.9.17
Sudo ProjectSudo Version1.9.17 Update-
CanonicalUbuntu Linux Version22.04 SwEditionlts
CanonicalUbuntu Linux Version24.04 SwEditionlts
CanonicalUbuntu Linux Version24.10 SwEdition-
CanonicalUbuntu Linux Version25.04 SwEdition-
DebianDebian Linux Version11.0
DebianDebian Linux Version12.0
DebianDebian Linux Version13.0
OpensuseLeap Version15.6
RedhatEnterprise Linux Version10.0
SuseLinux Enterprise Desktop Version15 Updatesp6
SuseLinux Enterprise Desktop Version15 Updatesp7
SuseLinux Enterprise Real Time Version15.0 Updatesp2
SuseLinux Enterprise Real Time Version15.0 Updatesp6
SuseLinux Enterprise Real Time Version15.0 Updatesp7
SuseLinux Enterprise Server For Sap Version12 Updatesp6
SuseLinux Enterprise Server For Sap Version12 Updatesp7

29.09.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability

Vulnerability

Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.

Description

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 23.61% 0.958
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cve@mitre.org 9.3 2.5 6
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-829 Inclusion of Functionality from Untrusted Control Sphere

The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
Third Party Advisory
Issue Tracking