{"id":7195,"date":"2025-09-30T08:20:36","date_gmt":"2025-09-30T08:20:36","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7195"},"modified":"2025-09-30T08:20:36","modified_gmt":"2025-09-30T08:20:36","slug":"cisa-sounds-alarm-on-important-sudo-flaw-actively-exploited-in-linux-and-unix-techniques","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7195","title":{"rendered":"CISA Sounds Alarm on Important Sudo Flaw Actively Exploited in Linux and Unix Techniques"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Sep 30, 2025<\/span><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Linux<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxghtolLODIv167lHKVGNtpEy6egVPNJ874v4Qj9Q6-rcWJFsEigtGzgZtFaH_-P6y9ngP7QVIwi9QLdddSdYxO0rbs0pn6Ruq1_YodP8DYby29LLv1DeyUdlv4KqtaDMHx_KXcxkfOkRGAYzBiPwbPlpNdK231qY9f_y2wBE0heXJFe-QoeJcj5w910Dc\/s728-rw-e365\/linux-root.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxghtolLODIv167lHKVGNtpEy6egVPNJ874v4Qj9Q6-rcWJFsEigtGzgZtFaH_-P6y9ngP7QVIwi9QLdddSdYxO0rbs0pn6Ruq1_YodP8DYby29LLv1DeyUdlv4KqtaDMHx_KXcxkfOkRGAYzBiPwbPlpNdK231qY9f_y2wBE0heXJFe-QoeJcj5w910Dc\/s728-rw-e365\/linux-root.jpg\" alt=\"Critical Sudo Flaw\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" title=\"Critical Sudo Flaw\"\/><\/a><\/div>\n<p>The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/09\/29\/cisa-adds-five-known-exploited-vulnerabilities-catalog\" rel=\"noopener\" target=\"_blank\">added<\/a> a crucial safety flaw impacting the Sudo command-line utility for Linux and Unix-like working techniques to its Identified Exploited Vulnerabilities (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"noopener\" target=\"_blank\">KEV<\/a>) catalog, citing proof of energetic exploitation within the wild.<\/p>\n<p>The vulnerability in query is CVE-2025-32463 (CVSS rating: 9.3), which impacts Sudo variations previous to 1.9.17p1. It was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/07\/critical-sudo-vulnerabilities-let-local.html\" rel=\"noopener\" target=\"_blank\">disclosed<\/a> by Stratascale researcher Wealthy Mirch again in July 2025.<\/p>\n<p>&#8220;Sudo incorporates an inclusion of performance from an untrusted management sphere vulnerability,&#8221; CISA stated. &#8220;This vulnerability may permit an area attacker to leverage sudo&#8217;s -R (&#8211;chroot) choice to run arbitrary instructions as root, even when they aren&#8217;t listed within the sudoers file.&#8221;<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/cis-security-suite\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"CIS Build Kits\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgkDdKZ4cf4syb2qVDyt76MS6-Iq2eLoi0woZ-R0yota4fauhbh-Ro40IHQaAcKWPGCf_BGWQSZd2VSdPJGkMefmls9YYuzVlgZ-mcdepOR1mlwFMTj2gqiGP5jHrt1VgmX72osdiB6x5DG-Tz1js5zJktU0pbKWFWqcqytxwSQZR9bRWMa9CBjiUDqomg\/s728-rw-e100\/cis-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>It is presently not identified how the shortcoming is being exploited in real-world assaults, and who could also be behind such efforts. Additionally added to the KEV catalog are 4 different flaws &#8211;<\/p>\n<ul>\n<li><strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/09\/hackers-exploit-pandoc-cve-2025-51591.html\" rel=\"noopener\" target=\"_blank\">CVE-2021-21311<\/a><\/strong> &#8211; Adminer incorporates a server-side request forgery vulnerability that, when exploited, permits a distant attacker to acquire probably delicate data. (Disclosed as exploited by Google Mandiant in Could 2022 by a risk actor referred to as UNC2903 to focus on AWS IMDS setups)<\/li>\n<li><strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/09\/cisco-warns-of-actively-exploited-snmp.html\" rel=\"noopener\" target=\"_blank\">CVE-2025-20352<\/a><\/strong> &#8211; Cisco IOS and IOS XE comprise a stack-based buffer overflow vulnerability within the Easy Community Administration Protocol (SNMP) subsystem that would permit for denial of service or distant code execution. (Disclosed as exploited by Cisco final week)<\/li>\n<li><strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/09\/fortra-goanywhere-cvss-10-flaw.html\" rel=\"noopener\" target=\"_blank\">CVE-2025-10035<\/a><\/strong> &#8211; Fortra GoAnywhere MFT incorporates a deserialization of untrusted information vulnerability that enables an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, probably resulting in command injection. (Disclosed as exploited by watchTowr Labs final week)<\/li>\n<li><strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/09\/state-sponsored-hackers-exploiting.html\" rel=\"noopener\" target=\"_blank\">CVE-2025-59689<\/a><\/strong> &#8211; Libraesva E-mail Safety Gateway (ESG) incorporates a command injection vulnerability that enables command injection through a compressed e-mail attachment. (Disclosed as exploited by Libraesva final week)<\/li>\n<\/ul>\n<p>In gentle of energetic exploitation, Federal Civilian Govt Department (FCEB) companies counting on the affected merchandise are suggested to use the mandatory mitigations by October 20, 2025, to safe their networks.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\ue802Sep 30, 2025\ue804Ravie LakshmananVulnerability \/ Linux The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday added a crucial safety flaw impacting the Sudo command-line utility for Linux and Unix-like working techniques to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild. The vulnerability in query is CVE-2025-32463 (CVSS rating: [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1993,2862,1359,420,1994,2705,2026,87,5636,140,5637],"class_list":["post-7195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-actively","tag-alarm","tag-cisa","tag-critical","tag-exploited","tag-flaw","tag-linux","tag-sounds","tag-sudo","tag-systems","tag-unix"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7195"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7195\/revisions"}],"predecessor-version":[{"id":7196,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7195\/revisions\/7196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7197"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-13 17:09:02 UTC -->