Critical Sudo Vulnerability Identified: What You Need to Know
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) made headlines earlier this week by adding a severe security flaw in the widely used Sudo command-line utility to its Known Exploited Vulnerabilities (KEV) catalog. This alert signifies that the vulnerability is currently being exploited in real-world scenarios, raising alarms for Linux and Unix-like operating system users.
Understanding the Vulnerability: CVE-2025-32463
The specific vulnerability is identified as CVE-2025-32463, carrying a high Common Vulnerability Scoring System (CVSS) score of 9.3. This flaw impacts Sudo versions prior to 1.9.17p1 and was first reported in July 2025 by Rich Mirch, a researcher with Stratascale. According to the CISA, the essence of the vulnerability lies in the improper implementation of functionality from an untrusted control sphere. This means that local attackers can exploit the sudo command’s -R (–chroot) option to run arbitrary commands with root privileges, bypassing restrictions typically enforced by the sudoers file.
Active Exploitation in the Wild
As of now, specific details about how this vulnerability is being exploited in actual attacks remain undetermined, along with the identities of those potentially involved in such malicious activities. The ambiguity has led cybersecurity experts and organizations to take precautionary measures to protect their systems.
Additional Vulnerabilities Added to the KEV Catalog
In conjunction with the Sudo vulnerability, CISA has also included four other flaws in its KEV catalog that warrant attention:
1. CVE-2021-21311
This vulnerability involves Adminer, which contains a server-side request forgery flaw that could allow a remote attacker to retrieve sensitive data. It was previously disclosed by Google Mandiant in May 2022 and was attributed to the threat actor group known as UNC2903, which targeted AWS Instance Metadata Service (IMDS) setups.
2. CVE-2025-20352
This issue pertains to Cisco IOS and IOS XE, which have been found to possess a stack-based buffer overflow vulnerability within their Simple Network Management Protocol (SNMP) subsystem. Exploiting this flaw could lead to either denial of service or remote code execution, with Cisco having reported the exploit just last week.
3. CVE-2025-10035
The Fortra GoAnywhere MFT software faces a deserialization of untrusted data vulnerability, allowing an attacker with a specially forged license response signature to insert an arbitrary, actor-controlled object. This could potentially lead to command injection. This risk was brought to light by watchTowr Labs last week.
4. CVE-2025-59689
Lastly, the Libraesva Email Security Gateway (ESG) contains a command injection vulnerability that can be triggered through a compressed email attachment. This flaw was also disclosed as being actively exploited by Libraesva last week.
Urgent Recommendations for Affected Organizations
In response to this significant threat landscape, CISA has urged Federal Civilian Executive Branch (FCEB) agencies, as well as other organizations relying on the affected products, to implement the necessary mitigations. The deadline for these essential updates is set for October 20, 2025. Failure to address these vulnerabilities could leave networks exposed to further exploitation and compromise.
By staying informed and proactive about these emerging threats, organizations can better protect their digital assets and ensure operational integrity in an increasingly complex cybersecurity landscape.


