⚠ Actively exploited
Added to CISA KEV on 2025-09-29. Federal agencies required to patch by 2025-10-20. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
Severity
7.8HIGH
EPSS
38.5%
top 2.76%
CISA KEV
KEV
Added 2025-09-29
Due 2025-10-20
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 30
KEV addedSep 29
Latest updateSep 30
KEV dueOct 20
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 2.5 | Impact: 6.0
Affected Packages6 packages
Also affects: Debian Linux 11.0, 12.0, 13.0, Linux Enterprise 12, Ubuntu Linux 22.04, 24.04, 24.10, 25.04, Enterprise Linux 10.0
🔴Vulnerability Details
5💥Exploits & PoCs
2Nuclei▶
Sudo - Local Privilege Escalation via chroot
🔍Detection Rules
3📋Vendor Advisories
5Debian▶
CVE-2025-32463: sudo - Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi...↗2025