CRITICAL SUDO FLAWS ALLOW LOCAL PRIVILEGE ESCALATION TO ROOT ON LINUX, AFFECTING MAJOR DISTROS

Cybersecurity researchers have identified two significant security vulnerabilities in the Sudo command-line utility, commonly used in Linux and Unix-like systems. These flaws could allow local attackers to escalate their privileges and gain root access on affected machines.

Sudo is a powerful tool that lets low-privileged users execute commands as another user—typically the superuser—enabling administrative actions without requiring full access. It’s designed to enforce the principle of least privilege, ensuring users can perform necessary tasks without compromising system security.

However, the newly disclosed vulnerabilities undermine that principle:

  • CVE-2025-32462 (CVSS score: 2.8): Affects versions of Sudo before 1.9.17p1. When used with a sudoers configuration that specifies a host name not matching the current machine or the ALL wildcard, it can allow permitted users to run commands on unintended systems.
  • CVE-2025-32463 (CVSS score: 9.3): Also affects versions before 1.9.17p1. This critical flaw lets local users gain root privileges by exploiting the --chroot option. Specifically, Sudo may load the /etc/nsswitch.conf file from a directory controlled by the attacker, allowing them to trick the utility into loading a malicious shared library.

This second vulnerability is particularly dangerous, as it can allow attackers to run arbitrary code with root-level access, simply by crafting a specific directory structure and configuration file.

System administrators are strongly encouraged to update to the latest version of Sudo to mitigate these risks.