Skip to main content Skip to local navigation

Sudo Vulnerability (CVE-2025-32463)

 

A picture containing text  Description automatically generated

 

Service Advisory 


A recently discovered critical sudo vulnerability (CVE-2025-32463) impacts Linux and Unix based Operating systems, that could enable local attackers to escalate their privileges and gain root level access.

Severity level 
CVSS Score: 9.3/Critical

Description
:
Sudo is a command-line tool that allows low-privileged users to run commands as another user, such as the superuser. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the -R (--chroot) option.

Affected Versions
 :
Sudo versions 1.9.0 - 1.9.17, 1.8.8 – 1.8.32.

Impact:
Successful exploitation allows full control of the systems.

Resolution:
Update to Sudo version 1.9.17p1 or later.

Reference:

https://ubuntu.com/security/CVE-2025-32463

https://nvd.nist.gov/vuln/detail/CVE-2025-32463

https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/

https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html

 



UIT Information Security

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web 

 

 

 

 

Sudo Vulnerability (CVE-2025-32463)

 

A picture containing text  Description automatically generated

 

Service Advisory 


A recently discovered critical sudo vulnerability (CVE-2025-32463) impacts Linux and Unix based Operating systems, that could enable local attackers to escalate their privileges and gain root level access.

Severity level 
CVSS Score: 9.3/Critical

Description
:
Sudo is a command-line tool that allows low-privileged users to run commands as another user, such as the superuser. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the -R (--chroot) option.

Affected Versions
 :
Sudo versions 1.9.0 - 1.9.17, 1.8.8 – 1.8.32.

Impact:
Successful exploitation allows full control of the systems.

Resolution:
Update to Sudo version 1.9.17p1 or later.

Reference:

https://ubuntu.com/security/CVE-2025-32463

https://nvd.nist.gov/vuln/detail/CVE-2025-32463

https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/

https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html

 



UIT Information Security

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web