CISA Alert: Critical Vulnerability in Sudo 🚨
A new vulnerability has been added by CISA to the Known Exploited Vulnerabilities (KEV) catalog:
🔹 CVE-2025-32463
CVSS Score: 9.3 (Critical)
Affected: All Sudo versions prior to 1.9.17p1
Platforms: All Linux distributions and Unix-like systems
According to CISA:
Sudo contains a flaw that allows third-party functionality to be invoked without proper domain checks. This vulnerability enables a local attacker to execute arbitrary commands with root privileges using the sudo -R (chroot) option—even if they are not listed in the sudoers file.
Confirmed exploitation in:
✔️ Ubuntu 24.04.1 (Sudo 1.9.15p5, 1.9.16p2)
✔️ Fedora 41 Server (Sudo 1.9.15p5)
✔️ Other distributions with security advisories: Alpine Linux, Amazon Linux, Debian, Gentoo, Red Hat
Check current version:
sudo -V
Immediate Update Instructions:
🔵 Debian / Ubuntu
sudo apt update
sudo apt install –only-upgrade sudo
🔵 RHEL / CentOS
sudo yum update sudo # Older versions
sudo dnf upgrade sudo # Newer versions
🔵 Fedora
sudo dnf upgrade sudo
🔵openSUSE (Leap / Tumbleweed)
sudo zypper refresh
sudo zypper update sudo
🔵Gentoo
sudo emerge –sync
sudo emerge –ask –verbose –update sudo
🔵Alpine Linux
sudo apk update
sudo apk upgrade sudo
💡 Recommendation: All Linux/Unix administrators should update immediately.
source: https://predator-os.ir/
Thanks to Levko for this update.
