CVE-2025-32462
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2025-32462. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1Attack Vector Metrics
Impact Metrics
Description
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
Available Exploits
Related News
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463) If you haven’t recently updated the Sudo utility on your Linux box(es), yo…
If you haven’t recently updated the Sudo utility on your Linux box(es), you should do so now, to patch two local privilege escalation vulnerabilities (CVE-2025-32462, CVE-2025-32463) that have been disclosed on Monday. What is Sudo? Sudo is command-line utili…
Affected Products
Affected Versions:
EU Vulnerability Database
Monitored by ENISA for EU cybersecurity
ENISA Analysis
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
Affected Products (ENISA)
ENISA Scoring
CVSS Score (3.1)
EPSS Score
ENISA References
Data provided by ENISA EU Vulnerability Database. Last updated: July 25, 2025
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: June 30, 2025, Modified: July 25, 2025
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
ASUSTOR NEW FIRMWARE RELEASE 5.0.0.RJG2 16.07.2025 Hello guys, i had issues with 5.0 in the past with Fan control not working and system randomly shuting down between 03:00-04:00. did someone update to the new version? Any issues so far? # Change log: * Sudo package updated to version 1.9.17p1 to …
sudo's latest "trick": when chroot and nsswitch conspire against you (cve-2025-32462) Ah, `sudo`. The trusty command that grants mere mortals the power of a deity (root, that is) on a Linux system. It's the gatekeeper, the bouncer, the one program we all implicitly trust to elevate our privileges without turning …
𝐓𝐨𝐝𝐚𝐲'𝐬 𝐏𝐚𝐭𝐜𝐡 𝐓𝐮𝐞𝐬𝐝𝐚𝐲 𝐨𝐯𝐞𝐫𝐯𝐢𝐞𝐰 • Microsoft has addressed 𝟏𝟑𝟕 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐢𝐞𝐬, 𝐧𝐨 𝐳𝐞𝐫𝐨-𝐝𝐚𝐲𝐬, 𝟏𝟒 𝐜𝐫𝐢𝐭𝐢𝐜𝐚𝐥 and 𝐨𝐧𝐞 𝐰𝐢𝐭𝐡 𝐏𝐨𝐂 • Third-party: web browsers, Linux Sudo, Citrix NetScaler, Cisco, WordPress, WinRAR, Brother printers, GitHub, Teleport, Veeam, Grafana, Palo Alto Networks, and Trend Micro. Navigate to 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐃𝐢𝐠𝐞𝐬𝐭 𝐟𝐫𝐨𝐦 𝐀𝐜𝐭𝐢𝐨𝐧𝟏 for comprehensive summary …
How to Use Sudo 1.9.13 Exploit? I saw that there was a new CVE(CVE-2025-32462) for sudo that allowed privesc using the --host flag, but no website explains how to use it(obviously). Is it really complicated in that it's tailored per computer, or is there a relatively simple command or set …
CVE-2025-32462: sudo: LPE via host option
🔥 Top 10 Trending CVEs (03/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-20309](https://nvd.nist.gov/vuln/detail/CVE-2025-20309)** - 📝 A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log …
🔥 Top 10 Trending CVEs (02/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-6554](https://nvd.nist.gov/vuln/detail/CVE-2025-6554)** - 📝 Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) - …
Sudo has multiple serious CVEs. If anyone else logs into your servers you need to update immediately. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host Also once again, [Installing packages you don't need increases your attack surface, sudo is not automatically more secure than root](https://old.reddit.com/r/selfhosted/comments/1hwko2i/rant_please_stop_including_sudo_in_instructions/). Maybe I'm an old curmudgeon, but anyone single-sudo-users who got burned …