Critical Sudo Vulnerability Allows Local Users Root Access
A critical vulnerability has been discovered in the widely-used Linux utility, Sudo. This issue, identified as CVE-2025-32463, allows local users to gain full root access to a targeted system. Users are urged to update to Sudo 1.9.17p1 or later to mitigate this risk.
The vulnerability, present in versions 1.9.14 to 1.9.17 and verified on Ubuntu 24.04.1 and Fedora 41 Server, exploits the chroot function. It undermines the least privilege access principle of Sudo, enabling unprivileged users to invoke chroot() on a writable, untrusted path under their control.
Rich Mirch, principal consultant at Stratascale, advises business leaders to prioritize an immediate audit of their environment to identify similar blind spots and patch all vulnerable systems. This is particularly crucial in enterprise environments that use the Host or Host_Alias directives, which can be leveraged with specific configurations to exploit this issue.
Organizations are warned to focus first on shared environments and systems in untrusted locations like internet-facing assets. They should urgently update to Sudo 1.9.17p1 or later to protect against this critical elevation of privilege vulnerability.
Read also:
- Web3 gaming platform, Pixelverse, debuts on Base and Farcaster networks
- Amazon customer duped over Nvidia RTX 5070 Ti purchase: shipped item replaced with suspicious white powder; PC hardware fan deceived, discovers salt instead of GPU core days after receiving defective RTX 5090.
- Infiltration of Estonian airspace by Russian military aircraft
- Cyber aggression intensifies by China-backed TA415 group, targeting Taiwan's semiconductor production and supply networks