Sudo Vulnerability Discovered, May Exposes Linux Systems
Briefly

Sudo, a common command-line tool on Linux systems, has two identified local privilege vulnerabilities: CVE-2025-32462 and CVE-2025-32463. CVE-2025-32462 has a lower CVSS score due to its reliance on misconfiguration of a Sudoers file, making it less likely to be exploited in typical environments. Conversely, CVE-2025-32463 allows for local privilege escalation without the need for user inclusion in the Sudoers file, posing a more significant risk. Security experts stress the importance of prioritizing resolution of these vulnerabilities to prevent unauthorized privilege escalation and command execution across organizations.
CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
CVE-2025-32463 involves a local privilege escalation vector that doesn't require the user to be in the Sudoers file. My only question to it would be, when it comes to elements such as infrastructure, how many of them are using Ubuntu 24.04?
Both the recently disclosed Sudo vulnerabilities should be treated as priorities for resolution by organizations, as both enable potential elevation of user privileges and unintended execution of commands on impacted devices.
The conditions for the vulnerability to be exploited require that specific configuration conditions are met in the affected environment, outside the default; however those conditions are not that unlikely.
Read at Securitymagazine
[
|
]