9.3

CVE-2025-32463

Warnung
Medienbericht
Exploit

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sudo ProjectSudo Version >= 1.9.14 < 1.9.17
Sudo ProjectSudo Version1.9.17 Update-
CanonicalUbuntu Linux Version22.04 SwEditionlts
CanonicalUbuntu Linux Version24.04 SwEditionlts
CanonicalUbuntu Linux Version24.10 SwEdition-
CanonicalUbuntu Linux Version25.04 SwEdition-
DebianDebian Linux Version11.0
DebianDebian Linux Version12.0
DebianDebian Linux Version13.0
OpensuseLeap Version15.6
RedhatEnterprise Linux Version10.0
SuseLinux Enterprise Desktop Version15 Updatesp6
SuseLinux Enterprise Desktop Version15 Updatesp7
SuseLinux Enterprise Real Time Version15.0 Updatesp2
SuseLinux Enterprise Real Time Version15.0 Updatesp6
SuseLinux Enterprise Real Time Version15.0 Updatesp7
SuseLinux Enterprise Server For Sap Version12 Updatesp6
SuseLinux Enterprise Server For Sap Version12 Updatesp7

29.09.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability

Schwachstelle

Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 23.61% 0.958
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cve@mitre.org 9.3 2.5 6
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-829 Inclusion of Functionality from Untrusted Control Sphere

The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.

https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
Third Party Advisory
Issue Tracking