9.3 CVE-2025-32463
CISA Kev Catalog RCE LCI RCI Local Execution Code Exploit
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
https://nvd.nist.gov/vuln/detail/CVE-2025-32463
Categories
CWE-829 : Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations. Use an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481]. Product does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable configuration variable in include file allows file inclusion via direct request. Modification of assumed-immutable variable in configuration script leads to file inclusion. PHP file inclusion. PHP file inclusion. PHP file inclusion. PHP local file inclusion. PHP remote file include. PHP remote file include. PHP remote file include. PHP remote file include. PHP remote file include. Directory traversal vulnerability in PHP include statement. Directory traversal vulnerability in PHP include statement. PHP file inclusion issue, both remote and local; local include uses ".." and "%00" characters as a manipulation, but many remote file inclusion issues probably have this vector.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-ha... Third Party Advisory |
cve@mitre.org Exploit
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* | >= 1.9.14 | < 1.9.17 |
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Other Nist (github, ...)
Url |
---|
https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-t... |
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
175 | Code Inclusion |
Very High |
201 | Serialized Data External Linking |
High |
228 | DTD Injection |
Medium |
251 | Local Code Inclusion |
Medium |
252 | PHP Local File Inclusion |
Medium |
253 | Remote Code Inclusion |
|
263 | Force Use of Corrupted Files |
Medium |
538 | Open-Source Library Manipulation |
High |
549 | Local Execution of Code |
High |
640 | Inclusion of Code in Existing Process |
High |
660 | Root/Jailbreak Detection Evasion via Hooking |
Very High |
695 | Repo Jacking |
High |
698 | Install Malicious Extension |
High |
MITRE
Techniques
id | description |
---|---|
T1055 | Process Injection |
T1176 | Browser Extensions |
T1195.001 | Supply Chain Compromise: Compromise Software Dependencies and Development Tools |
T1505.004 | Server Software Component: IIS Components |
T1505.005 | Server Software Component: Terminal Services DLL |
T1574.006 | Hijack Execution Flow:Dynamic Linker Hijacking |
T1574.013 | Hijack Execution Flow: KernelCallbackTable |
T1620 | Reflective Code Loading |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
M1026 | Utilize Yama (ex: /proc/sys/kernel/yama/ptrace_scope) to mitigate ptrace based process injection by restricting the use of ptrace to privileged users only. Other mitigation controls involve the deployment of security kernel modules that provide advanced access control and process restrictions such as SELinux, grsecurity, and AppArmor. |
M1017 | Close out all browser sessions when finished using them to prevent any potentially malicious extensions from continuing to run. |
M1016 | Continuous monitoring of vulnerability sources and the use of automatic and manual code review tools should also be implemented as well. |
M1026 | Do not allow administrator accounts that have permissions to add IIS components to be used for day-to-day operations that may expose these permissions to potential adversaries and/or other unprivileged systems. |
M1024 | Consider using Group Policy to configure and block modifications to Terminal Services parameters in the Registry. |
M1028 | When System Integrity Protection (SIP) is enabled in macOS, the aforementioned environment variables are ignored when executing protected binaries. Third-party applications can also leverage Apple’s Hardened Runtime, ensuring these environment variables are subject to imposed restrictions. Admins can add restrictions to applications by setting the setuid and/or setgid bits, use entitlements, or have a __RESTRICT segment in the Mach-O binary. |
M1040 | Some endpoint security solutions can be configured to block some types of behaviors related to process injection/memory tampering based on common sequences of indicators (ex: execution of specific API functions). |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.