{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2025-32463","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2026-02-26T17:50:20.931Z","dateReserved":"2025-04-09T00:00:00.000Z","datePublished":"2025-06-30T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Sudo","vendor":"Sudo project","versions":[{"lessThan":"1.9.17p1","status":"affected","version":"1.9.14","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-829","description":"CWE-829 Inclusion of Functionality from Untrusted Control Sphere","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2025-07-22T14:59:53.402Z"},"references":[{"url":"https://www.sudo.ws/security/advisories/"},{"url":"https://www.sudo.ws/releases/changelog/"},{"url":"https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot"},{"url":"https://www.openwall.com/lists/oss-security/2025/06/30/3"},{"url":"https://access.redhat.com/security/cve/cve-2025-32463"},{"url":"https://ubuntu.com/security/notices/USN-7604-1"},{"url":"https://security-tracker.debian.org/tracker/CVE-2025-32463"},{"url":"https://explore.alas.aws.amazon.com/CVE-2025-32463.html"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463"},{"url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/"},{"url":"https://www.suse.com/security/cve/CVE-2025-32463.html"},{"url":"https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/"},{"url":"https://www.sudo.ws/security/advisories/chroot_bug/"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability"}],"x_generator":{"engine":"enrichogram 0.0.1"},"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":9.3,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.14","versionEndExcluding":"1.9.17p1"}]}]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-32463","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-09-27T03:55:22.188746Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-09-29","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463"}}}],"references":[{"url":"https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/","tags":["exploit"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463","tags":["government-resource"]}],"timeline":[{"time":"2025-09-29T00:00:00.000Z","lang":"en","value":"CVE-2025-32463 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:50:20.931Z"}}]},"dataVersion":"5.2"}