• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

CISA Sounds Alarm on Important Sudo Flaw Actively Exploited in Linux and Unix Techniques

Admin by Admin
September 30, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Sep 30, 2025Ravie LakshmananVulnerability / Linux

Critical Sudo Flaw

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday added a crucial safety flaw impacting the Sudo command-line utility for Linux and Unix-like working techniques to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild.

The vulnerability in query is CVE-2025-32463 (CVSS rating: 9.3), which impacts Sudo variations previous to 1.9.17p1. It was disclosed by Stratascale researcher Wealthy Mirch again in July 2025.

“Sudo incorporates an inclusion of performance from an untrusted management sphere vulnerability,” CISA stated. “This vulnerability may permit an area attacker to leverage sudo’s -R (–chroot) choice to run arbitrary instructions as root, even when they aren’t listed within the sudoers file.”

CIS Build Kits

It is presently not identified how the shortcoming is being exploited in real-world assaults, and who could also be behind such efforts. Additionally added to the KEV catalog are 4 different flaws –

  • CVE-2021-21311 – Adminer incorporates a server-side request forgery vulnerability that, when exploited, permits a distant attacker to acquire probably delicate data. (Disclosed as exploited by Google Mandiant in Could 2022 by a risk actor referred to as UNC2903 to focus on AWS IMDS setups)
  • CVE-2025-20352 – Cisco IOS and IOS XE comprise a stack-based buffer overflow vulnerability within the Easy Community Administration Protocol (SNMP) subsystem that would permit for denial of service or distant code execution. (Disclosed as exploited by Cisco final week)
  • CVE-2025-10035 – Fortra GoAnywhere MFT incorporates a deserialization of untrusted information vulnerability that enables an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, probably resulting in command injection. (Disclosed as exploited by watchTowr Labs final week)
  • CVE-2025-59689 – Libraesva E-mail Safety Gateway (ESG) incorporates a command injection vulnerability that enables command injection through a compressed e-mail attachment. (Disclosed as exploited by Libraesva final week)

In gentle of energetic exploitation, Federal Civilian Govt Department (FCEB) companies counting on the affected merchandise are suggested to use the mandatory mitigations by October 20, 2025, to safe their networks.

Tags: ActivelyAlarmCISACriticalExploitedFlawLinuxSoundsSudoSystemsUnix
Admin

Admin

Next Post
Asus TUF Gaming T500 PC Overview: Nice for New PC Players

Asus TUF Gaming T500 PC Overview: Nice for New PC Players

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Goldilocks RL: Tuning Job Problem to Escape Sparse Rewards for Reasoning

Goldilocks RL: Tuning Job Problem to Escape Sparse Rewards for Reasoning

March 22, 2026
Crucial Quest KACE Vulnerability Probably Exploited in Assaults

Crucial Quest KACE Vulnerability Probably Exploited in Assaults

March 22, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved