9.3 CVE-2025-32463

CISA Kev Catalog RCE LCI RCI Local Execution Code Exploit
 

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
https://nvd.nist.gov/vuln/detail/CVE-2025-32463

Categories

CWE-829 : Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations. Use an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481]. Product does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable variable in configuration script leads to file inclusion. PHP file inclusion. PHP file inclusion. PHP file inclusion. PHP local file inclusion. PHP remote file include. PHP remote file include. PHP remote file include. PHP remote file include. PHP remote file include. Directory traversal vulnerability in PHP include statement. Directory traversal vulnerability in PHP include statement. PHP file inclusion issue, both remote and local; local include uses ".." and "%00" characters as a manipulation, but many remote file inclusion issues probably have this vector.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* >= 1.9.14 < 1.9.17
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
https://github.com/K1tt3h/CVE-2025-32463-POC
https://github.com/SysMancer/CVE-2025-32463
https://github.com/kh4sh3i/CVE-2025-32463
https://github.com/pevinkumar10/CVE-2025-32463
https://github.com/zhaduchanhzz/CVE-2025-32463_POC
https://github.com/robbert1978/CVE-2025-32463_POC
https://github.com/Mikivirus0/sudoinjection
https://github.com/nflatrea/CVE-2025-32463
https://github.com/ill-deed/CVE-2025-32463_illdeed
https://github.com/zinzloun/CVE-2025-32463
https://github.com/junxian428/CVE-2025-32463
https://github.com/FreeDurok/CVE-2025-32463-PoC
https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot
https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
https://github.com/MGunturG/CVE-2025-32463
https://github.com/daryllundy/CVE-2025-32463
https://github.com/KaiHT-Ladiant/CVE-2025-32463
https://github.com/aldoClau98/CVE-2025-32463
https://github.com/painoob/CVE-2025-32463
https://github.com/Yuy0ung/CVE-2025-32463_chwoot
https://github.com/blackcat4347/CVE-2025-32463_PoC
https://github.com/ashardev002/CVE-2025-32463_chwoot
https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape
https://github.com/AC8999/CVE-2025-32463

Other Nist (github, ...)

Url
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-t...
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
175 Code Inclusion
Very High
201 Serialized Data External Linking
High
228 DTD Injection
Medium
251 Local Code Inclusion
Medium
252 PHP Local File Inclusion
Medium
253 Remote Code Inclusion
263 Force Use of Corrupted Files
Medium
538 Open-Source Library Manipulation
High
549 Local Execution of Code
High
640 Inclusion of Code in Existing Process
High
660 Root/Jailbreak Detection Evasion via Hooking
Very High
695 Repo Jacking
High
698 Install Malicious Extension
High


MITRE


Techniques

id description
T1055 Process Injection
T1176 Browser Extensions
T1195.001 Supply Chain Compromise: Compromise Software Dependencies and Development Tools
T1505.004 Server Software Component: IIS Components
T1505.005 Server Software Component: Terminal Services DLL
T1574.006 Hijack Execution Flow:Dynamic Linker Hijacking
T1574.013 Hijack Execution Flow: KernelCallbackTable
T1620 Reflective Code Loading
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1026 Utilize Yama (ex: /proc/sys/kernel/yama/ptrace_scope) to mitigate ptrace based process injection by restricting the use of ptrace to privileged users only. Other mitigation controls involve the deployment of security kernel modules that provide advanced access control and process restrictions such as SELinux, grsecurity, and AppArmor.
M1017 Close out all browser sessions when finished using them to prevent any potentially malicious extensions from continuing to run.
M1016 Continuous monitoring of vulnerability sources and the use of automatic and manual code review tools should also be implemented as well.
M1026 Do not allow administrator accounts that have permissions to add IIS components to be used for day-to-day operations that may expose these permissions to potential adversaries and/or other unprivileged systems.
M1024 Consider using Group Policy to configure and block modifications to Terminal Services parameters in the Registry.
M1028 When System Integrity Protection (SIP) is enabled in macOS, the aforementioned environment variables are ignored when executing protected binaries. Third-party applications can also leverage Apple’s Hardened Runtime, ensuring these environment variables are subject to imposed restrictions. Admins can add restrictions to applications by setting the setuid and/or setgid bits, use entitlements, or have a __RESTRICT segment in the Mach-O binary.
M1040 Some endpoint security solutions can be configured to block some types of behaviors related to process injection/memory tampering based on common sequences of indicators (ex: execution of specific API functions).
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.