Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-32463

Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

POC

Reference

- https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/

- https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability

- https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability

Github

- https://github.com/0xAkarii/CVE-2025-32463

- https://github.com/0xMarcio/cve

- https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT

- https://github.com/0xsyr0/OSCP

- https://github.com/4f-kira/CVE-2025-32463

- https://github.com/7r00t/cve-2025-32463-lab

- https://github.com/9Insomnie/CVE-2025-32463

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462

- https://github.com/Adonijah01/cve-2025-32463-lab

- https://github.com/Andromeda254/cve

- https://github.com/At0mXploit/CVE-2025-32463

- https://github.com/B1ack4sh/Blackash-CVE-2025-32463

- https://github.com/CIA911/sudo_patch_CVE-2025-32463

- https://github.com/ChetanKomal/sudo_exploit

- https://github.com/Chocapikk/CVE-2025-32463-lab

- https://github.com/DaadaAyoze/CVE-2025-32463-lab

- https://github.com/Disturbante/Linux-Pentest

- https://github.com/Dlodlos/CVE-2025-32463-lab

- https://github.com/EGI-Federation/SVG-advisories

- https://github.com/Floodnut/CVE-2025-32463

- https://github.com/FoxSecIntel/Vulnerability-Analysis

- https://github.com/FreeDurok/CVE-2025-32463-PoC

- https://github.com/GhostTroops/TOP

- https://github.com/IC3-512/linux-root-kit

- https://github.com/Ilansos/ansible-sudo-cve2025-patch

- https://github.com/Imahamed/SPR888-Project

- https://github.com/K1tt3h/CVE-2025-32463-POC

- https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT

- https://github.com/KaiHT-Ladiant/CVE-2025-32463

- https://github.com/Kali-Cyber-Solutions-L-L-C/Outer-Haven-Alpha

- https://github.com/LSP1025923/CVE

- https://github.com/LucaReggiannini/cve2hash

- https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab

- https://github.com/MGunturG/CVE-2025-32463

- https://github.com/Maalfer/Sudo-CVE-2021-3156

- https://github.com/Mikivirus0/sudoinjection

- https://github.com/MohamedKarrab/CVE-2025-32463

- https://github.com/Nowafen/CVE-2025-32463

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Rajneeshkarya/CVE-2025-32463

- https://github.com/Sam7489/sudo-chwoot

- https://github.com/SkylerMC/CVE-2025-32463

- https://github.com/SpongeBob-369/cve-2025-32463

- https://github.com/SysMancer/CVE-2025-32463

- https://github.com/TH3xACE/SUDO_KILLER

- https://github.com/Threekiii/CVE

- https://github.com/WoodManGitHub/CVE-Research

- https://github.com/Yuy0ung/CVE-2025-32463_chwoot

- https://github.com/a1batr0ssG/VulhubExpand

- https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

- https://github.com/aldoClau98/CVE-2025-32463

- https://github.com/arianfarokhmid/upgrade-sudo

- https://github.com/ashardev002/CVE-2025-32463_chwoot

- https://github.com/behnamvanda/CVE-2025-32463

- https://github.com/behnamvanda/behnamvanda

- https://github.com/blackcat4347/CVE-2025-32463_PoC

- https://github.com/cyberpoul/CVE-2025-32463-POC

- https://github.com/daryllundy/CVE-2025-32463

- https://github.com/dbarquero/cve-2025-32463-lab

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/gvincenti/Expressway

- https://github.com/hackingyseguridad/root

- https://github.com/ill-deed/CVE-2025-32463_illdeed

- https://github.com/jitmondal1/OSCP

- https://github.com/junxian428/CVE-2025-32463

- https://github.com/kh4sh3i/CVE-2025-32463

- https://github.com/kherrick/lobsters

- https://github.com/kherrick/news-summary

- https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC

- https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot

- https://github.com/mibeyki/sudo_ansible_patch

- https://github.com/mihnasdsad/CVE-2025-32463

- https://github.com/mirchr/CVE-2025-32463-sudo-chwoot

- https://github.com/mirchr/security-research

- https://github.com/morgenm/portfolio

- https://github.com/morgenm/sudo-chroot-CVE-2025-32463

- https://github.com/neko205-mx/CVE-2025-32463_Exploit

- https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape

- https://github.com/nflatrea/CVE-2025-32463

- https://github.com/no-speech-to-text/CVE-2025-32463

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/painoob/CVE-2025-32463

- https://github.com/pevinkumar10/CVE-2025-32463

- https://github.com/pevinkumar10/CVE-2025-47812

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/portfolio-2025br/sudo-cve-062025

- https://github.com/pr0v3rbs/CVE-2025-32463_chwoot

- https://github.com/robbert1978/CVE-2025-32463_POC

- https://github.com/san8383/CVE-2025-32463

- https://github.com/tanjiti/sec_profile

- https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-

- https://github.com/tsaian0824/tsaian0824

- https://github.com/voidr3aper-anon/ghost

- https://github.com/xtaran/sshudo

- https://github.com/y4ney/CVE-2025-32463-lab

- https://github.com/yembors64632/cve_monitor_Public

- https://github.com/yeremeu/CVE-2025-32463_chwoot

- https://github.com/zenzue/sudo-CVE-2025-Toolkit

- https://github.com/zhaduchanhzz/CVE-2025-32463_POC

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zinzloun/CVE-2025-32463

- https://github.com/zulloper/cve-poc