CRITICAL · 9.3

CVE-2025-32463

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Vulnerability Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

CVSS Score

9.3

CRITICAL

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Sudo ProjectSudo>= 1.9.14, < 1.9.17
CanonicalUbuntu Linux22.04
DebianDebian Linux11.0
OpensuseLeap15.6
RedhatEnterprise Linux10.0
SuseLinux Enterprise Desktop15
SuseLinux Enterprise Real Time15.0
SuseLinux Enterprise Server For Sap12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2025-32463?

CVE-2025-32463 is a vulnerability with a CVSS score of 9.3 (CRITICAL). Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

How severe is CVE-2025-32463?

CVE-2025-32463 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2025-32463?

Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap, Redhat Enterprise Linux.