DNA View

⚠️ CISA Known Exploited Vulnerability

Active Threat

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.

CVE-2025-32463

Critical CISA KEV
Low Medium High Critical
9.3
CVSS Score
Published: Jun 30, 2025
Last Modified: Nov 05, 2025

Vulnerability Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
C
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

16 configuration(s) from 6 vendor(s)

ubuntu_linux
Version:
25.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*
ubuntu_linux
Version:
24.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
ubuntu_linux
Version:
22.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
ubuntu_linux
Version:
24.10
CPE:
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*
debian_linux
Version:
12.0
CPE:
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
debian_linux
Version:
13.0
CPE:
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
debian_linux
Version:
11.0
CPE:
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
leap
Version:
15.6
CPE:
cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
enterprise_linux
Version:
10.0
CPE:
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
sudo
Version:
1.9.14
CPE:
cpe:2.3:a:sudo_project:sudo:1.9.14:-:*:*:*:*:*:*
sudo
Version:
1.9.17
CPE:
cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*
sudo
Version:
1.9.15
CPE:
cpe:2.3:a:sudo_project:sudo:1.9.15:-:*:*:*:*:*:*
sudo
Version:
1.9.16
CPE:
cpe:2.3:a:sudo_project:sudo:1.9.16:-:*:*:*:*:*:*
linux_enterprise_desktop
Version:
15
CPE:
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*
linux_enterprise_real_time
Version:
15.0
CPE:
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
linux_enterprise_server_for_sap
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp5:*:*:*:*:*:*
This vulnerability affects 16 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

3 patches available from vendors

View All Patches
Microsoft

2025-Jul-CVE-2025-32463

CVE-2025-32463: None

Severity
Unknown
Released
Sep 17, 2025
Security Update
Microsoft

2025-Jun-CVE-2025-32463

CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access

Severity
Unknown
Released
Sep 04, 2025
Security Update
SUSE

CVE-2025-32463

CVE-2025-32463

Severity
Unknown
Released
Jun 30, 2025
Security Update

References & Resources

Severity Details

9.3
out of 10.0
Critical

CISA KEV Status

Active Exploitation

Listed in CISA's Known Exploited Vulnerabilities catalog

Weakness Type (CWE)

CWE-829

Inclusion of Functionality from Untrusted Control Sphere

Description
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Typical Severity
Medium
Abstraction Level
Base

Key Information

Published Date
June 30, 2025