CVE-2025-32463

9.3 CRITICAL CISA KEV

📋 TL;DR

This vulnerability in Sudo allows local users to escalate privileges to root by exploiting the --chroot option to load a malicious /etc/nsswitch.conf file from a user-controlled directory. It affects systems running vulnerable Sudo versions where users have local access. The high CVSS score reflects the potential for complete system compromise.

💻 Affected Systems

Products:
  • sudo
Versions: All versions before 1.9.17p1
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Sudo with --chroot option usage and user ability to control directory path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges, enabling complete system takeover, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Privileged local user or attacker with initial foothold escalates to root to install malware, access sensitive data, or bypass security controls.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service or minimal privilege escalation if exploit fails.

🌐 Internet-Facing: LOW - Requires local user access, not directly exploitable remotely.
🏢 Internal Only: HIGH - Any local user account can potentially exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local user access and ability to create/modify files in controlled directory. Proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.17p1

Vendor Advisory: https://access.redhat.com/security/cve/cve-2025-32463

Restart Required: No

Instructions:

1. Update sudo package using system package manager. 2. For RedHat/CentOS: 'sudo yum update sudo'. 3. For Debian/Ubuntu: 'sudo apt update && sudo apt upgrade sudo'. 4. For source installations: Download and compile sudo 1.9.17p1 or later.

🔧 Temporary Workarounds

Restrict chroot usage

linux

Limit sudoers configuration to prevent use of --chroot option by untrusted users

Edit /etc/sudoers to remove or restrict chroot privileges

File permission hardening

linux

Set strict permissions on directories users can control

chmod 755 /home/*
chmod 700 /home/user_controlled_dirs

🧯 If You Can't Patch

  • Implement strict sudoers policies to limit --chroot usage to trusted administrators only
  • Monitor for suspicious sudo --chroot usage and file creation in user directories

🔍 How to Verify

Check if Vulnerable:

Run 'sudo --version' and check if version is earlier than 1.9.17p1

Check Version:

sudo --version | head -1

Verify Fix Applied:

After update, verify 'sudo --version' shows 1.9.17p1 or later

📡 Detection & Monitoring

Log Indicators:

  • sudo logs showing --chroot usage with unusual paths
  • Authentication logs showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from privileged processes

SIEM Query:

source="sudo" AND "--chroot" AND NOT path="/etc/nsswitch.conf"

🔗 References

📤 Share & Export