Post

Critical Sudo bugs expose major Linux distros to local Root exploits

Cybersecurity researchers disclosed two vulnerabilities in the Sudo command-line utility for Linux and Unix-like operating systems. Local attackers can exploit the vulnerabilities to escalate privileges to root on affected systems.

Sudo (short for “superuser do”) is a command-line utility found in Unix and Linux systems. It lets a permitted user run commands with the security privileges of another user, most commonly the root user (the system’s most powerful administrative account).

Below is the description of the two vulnerabilities:

  • CVE-2025-32462 (CVSS score: 2.8) – Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
  • CVE-2025-32463 (CVSS score: 9.3) – Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the –chroot option.

The Stratascale Cyber Research Unit (CRU) team discovered both local privilege vulnerabilities.

To read the complete article see:

Critical Sudo bugs expose major Linux distros to local Root exploits

This post is licensed under CC BY 4.0 by the author.