PT-2025-27466 · Sudo +4 · Sudo +4
Rich Mirch
·
Published
2025-06-30
·
Updated
2025-08-01
·
CVE-2025-32463
9.3
Critical
Base vector | Vector | AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
## Vulnerability Report
**Name of the Vulnerable Software and Affected Versions:** Sudo versions 1.9.14 through 1.9.17
**Description:**
This vulnerability allows local users to obtain root access because `/etc/nsswitch.conf` from a user-controlled directory is used with the `--chroot` option. An attacker can leverage the `--chroot` option to run arbitrary commands as root, even if they are not listed in the sudoers file. The vulnerability exists because `sudo` improperly handles the `/etc/nsswitch.conf` file when the `--chroot` option is used, allowing an attacker to inject malicious configurations. A proof-of-concept (PoC) exploit is available. This vulnerability affects many Linux distributions, including Ubuntu and Fedora.
**Recommendations:**
Update to sudo version 1.9.17p1 or later.
Exploit
Fix
LPE
Weakness Enumeration
Related Identifiers
Affected Products
References · 218
- 🔥 https://github.com/pr0v3rbs/CVE-2025-32463_chwoot⭐ 190 🔗 52 · Exploit
- 🔥 https://stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot · Exploit
- 🔥 https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root · Exploit
- 🔥 https://secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463 · Exploit
- https://osv.dev/vulnerability/ALSA-2025:11537 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-32463 · Vendor Advisory
- https://osv.dev/vulnerability/USN-7604-1 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-08356 · Security Note
- http://repo.red-soft.ru/redos/7.3c/x86_64/updates · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2025-8851 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-32463 · Vendor Advisory
- https://advisories.mageia.org/MGASA-2025-0213.html · Security Note
- https://errata.altlinux.org/ALT-PU-2025-8863 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7604-1 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-07765 · Security Note