A recently discovered critical sudo vulnerability (CVE-2025-32463) impacts Linux and Unix based Operating systems, that could enable local attackers to escalate their privileges and gain root level access.
Severity level CVSS Score: 9.3/Critical Description: Sudo is a command-line tool that allows low-privileged users to run commands as another user, such as the superuser. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the -R (--chroot) option. Affected Versions : Sudo versions 1.9.0 - 1.9.17, 1.8.8 – 1.8.32. Impact: Successful exploitation allows full control of the systems. Resolution: Update to Sudo version 1.9.17p1 or later.
This email is viewed best in Microsoft Outlook for web
Sudo Vulnerability (CVE-2025-32463)
Posted on
July 4, 2025
Service Advisory
A recently discovered critical sudo vulnerability (CVE-2025-32463) impacts Linux and Unix based Operating systems, that could enable local attackers to escalate their privileges and gain root level access.
Severity level CVSS Score: 9.3/Critical Description: Sudo is a command-line tool that allows low-privileged users to run commands as another user, such as the superuser. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the -R (--chroot) option. Affected Versions : Sudo versions 1.9.0 - 1.9.17, 1.8.8 – 1.8.32. Impact: Successful exploitation allows full control of the systems. Resolution: Update to Sudo version 1.9.17p1 or later.