{"id":348835,"date":"2025-09-30T06:40:00","date_gmt":"2025-09-30T13:40:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=397472"},"modified":"2025-09-30T07:10:28","modified_gmt":"2025-09-30T14:10:28","slug":"linux-has-a-critical-vulnerability-even-if-no-one-really-knows-how-it-is-being-exploited","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/linux-has-a-critical-vulnerability-even-if-no-one-really-knows-how-it-is-being-exploited\/","title":{"rendered":"Linux has a critical vulnerability, even if no one really knows how it is being exploited"},"content":{"rendered":"\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added the vulnerability CVE-2025-32463 to its catalog of Known Exploited Vulnerabilities (KEV). <strong>This critical flaw affects Sudo versions prior to 1.9.17p1 and has a CVSS score of 9.3, placing it in the high severity category<\/strong>. The first alerts about this vulnerability were issued in July 2025 by researcher Rich Mirch from Stratascale.<\/p>\n\n\n<h2 class=\"wp-block-heading\">A very serious vulnerability to fix<\/h2>\n\n\n<p>CISA warns that this vulnerability can be exploited by local attackers to execute arbitrary commands with root privileges,<strong> taking advantage of the -R (&#8211;chroot) option of Sudo, even if such commands are not listed in the sudoers file<\/strong>. This makes it a potentially devastating attack vector for systems that rely on Sudo for privilege management.<\/p>\n\n\n<p>According to recent reports, there is evidence of active exploitation of this vulnerability in the real world, <strong>although the exact details of how these attacks are being carried out and who is responsible have not yet been clarified<\/strong>. This lack of information may indicate the urgency with which system administrators must act to mitigate the risk.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"sudo chroot Tech Details [CVE-2025-32463]\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/jsiP6TiGg-I?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>Agencies of the Federal Civilian Executive Branch (FCEB) are being specifically warned to implement mitigation measures before October 20, 2025, to protect their networks from potential intrusions. <strong>In addition to CVE-2025-32463, CISA has also included four other vulnerabilities in its catalog<\/strong>, highlighting the importance of cybersecurity in the current landscape.<\/p>\n\n\n<p>System administrators are urged to review their Sudo implementations and <strong>apply all necessary updates to ensure the integrity of their networks against this and other imminent threats<\/strong>. Prompt attention to these warnings could make a difference in preventing significant intrusions.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Avast Free Antivirus\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2d9f9134-96d0-11e6-bf8f-00163ec9f5fa\/1408299994\/avast-Avast_Symbol_V2_Positive_Orange_256x256.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Avast Free Antivirus<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/avast.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/avast.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added the vulnerability CVE-2025-32463 to its catalog of Known Exploited Vulnerabilities (KEV). This critical flaw affects Sudo versions prior to 1.9.17p1 and has a CVSS score of 9.3, placing it in the high severity category. The first alerts about this vulnerability were issued in July 2025 by researcher Rich Mirch from Stratascale. A very serious vulnerability to address CISA warns that this vulnerability can be exploited by local attackers to execute arbitrary commands with root privileges, taking advantage of [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":348836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[16638,5605,15053,16639,16640,14303,5431,16641,16642],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-348835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-agencia-de-seguridad-cibernetica-e-infraestructura-de-ee-uu","tag-ciberseguridad","tag-cisa","tag-fceb","tag-federal-civilian-executive-branch","tag-kev","tag-linux","tag-root","tag-sudo","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/348835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=348835"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/348835\/revisions"}],"predecessor-version":[{"id":348849,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/348835\/revisions\/348849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/348836"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=348835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=348835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=348835"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=348835"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=348835"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=348835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}