Skip to content

Critical Sudo Vulnerability Allows Local Users Root Access

Sudo's chroot function exploited. Businesses urged to audit and patch immediately to prevent unauthorized root access.

In this image we can see a bug in someone's hand.
In this image we can see a bug in someone's hand.

Critical Sudo Vulnerability Allows Local Users Root Access

A critical vulnerability has been discovered in the widely-used Linux utility, Sudo. This issue, identified as CVE-2025-32463, allows local users to gain full root access to a targeted system. Users are urged to update to Sudo 1.9.17p1 or later to mitigate this risk.

The vulnerability, present in versions 1.9.14 to 1.9.17 and verified on Ubuntu 24.04.1 and Fedora 41 Server, exploits the chroot function. It undermines the least privilege access principle of Sudo, enabling unprivileged users to invoke chroot() on a writable, untrusted path under their control.

Rich Mirch, principal consultant at Stratascale, advises business leaders to prioritize an immediate audit of their environment to identify similar blind spots and patch all vulnerable systems. This is particularly crucial in enterprise environments that use the Host or Host_Alias directives, which can be leveraged with specific configurations to exploit this issue.

Organizations are warned to focus first on shared environments and systems in untrusted locations like internet-facing assets. They should urgently update to Sudo 1.9.17p1 or later to protect against this critical elevation of privilege vulnerability.

Read also:

Latest