CVE-2025-32463
critical-risk
Published 2025-06-30
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Do I need to act?
!
38.5% chance of exploitation in next 30 days
EPSS score — higher than 62% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.3/10
Critical
LOCAL
/ LOW complexity
Affected Products (18)
References (17)
Third Party Advisory
https://access.redhat.com/security/cve/cve-2025-32463
Issue Tracking
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
Third Party Advisory
https://explore.alas.aws.amazon.com/CVE-2025-32463.html
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2025-32463
Third Party Advisory
https://ubuntu.com/security/notices/USN-7604-1
Third Party Advisory
https://www.openwall.com/lists/oss-security/2025/06/30/3
Release Notes
https://www.sudo.ws/releases/changelog/
Vendor Advisory
https://www.sudo.ws/security/advisories/
Vendor Advisory
https://www.sudo.ws/security/advisories/chroot_bug/
Third Party Advisory
https://www.suse.com/security/cve/CVE-2025-32463.html
Third Party Advisory
https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/
Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability
Third Party Advisory
https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hacke...
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-...
71
/ 100
critical-risk
Severity
28/34 · Critical
Exploitability
24/34 · High
Exposure
19/34 · Moderate