Skip to content

Critical Sudo Vulnerability Exploited: Linux & Unix Systems at Risk

Sudo's -R option flaw lets users gain root access. Act now to protect your systems from serious risks.

In this picture we can see a bug here, at the bottom there is mat, we can see wall in the...
In this picture we can see a bug here, at the bottom there is mat, we can see wall in the background.

Critical Sudo Vulnerability Exploited: Linux & Unix Systems at Risk

A critical vulnerability in the Linux and Unix sudo utility, CVE-2025-32463, has been identified and is currently being exploited. The German Federal Office for Information Security (BSI) has set a deadline of October 20, 2025, for remediation, after which unpatched systems face serious risks.

The vulnerability stems from improper validation in handling the -R (-chroot) option. This allows local adversaries to bypass access controls and execute arbitrary commands as the root user, even without explicit sudoers privileges. Attackers can craft a malicious chroot environment to trick sudo into executing code with elevated privileges, leading to full system takeover.

The Cybersecurity and Infrastructure Security Agency (CISA) has designated the vulnerability remediation Due Date as 2025-10-20. After this date, unpatched systems risk complete compromise of confidentiality, integrity, and availability. Organizations are urged to update to the latest sudo release or disable the -R option if patches cannot be deployed. Regular system monitoring for unusual chroot usage patterns is also recommended.

The sudo vulnerability CVE-2025-32463 poses a significant threat to Linux and Unix systems. Organizations must prioritize updating to the latest release or implementing workarounds by the BSI's deadline of October 20, 2025, to prevent unauthorized root access, data breaches, or system-wide compromise.

Read also:

Latest