CVE-2025-64517
BaseFortify
Publication date: 2025-11-12
Last updated on: 2026-02-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sudo-rs | sudo-rs | 0.2.5 |
| sudo-rs | sudo-rs | 0.2.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in sudo-rs (versions 0.2.5 to before 0.2.10) involves incorrect recording of the invoking user's UID instead of the authenticated user's UID in the authentication timestamp when using 'Defaults targetpw' or 'Defaults rootpw'. This flaw allows a highly-privileged user who knows one allowed account password to run commands as any other account permitted by policy without knowing those other passwords, effectively bypassing intended authentication requirements.
How can this vulnerability impact me? :
The vulnerability can allow a user with elevated sudo privileges and knowledge of one account password to execute commands as other accounts without needing their passwords. This can lead to unauthorized privilege escalation and execution of commands as root or other users, potentially compromising system security.
What immediate steps should I take to mitigate this vulnerability?
Upgrade sudo-rs to version 0.2.10 or later, as this version contains the patch that fixes the vulnerability. Additionally, review and adjust the use of `Defaults targetpw` or `Defaults rootpw` options in your sudo-rs configuration to ensure they are not causing unintended authentication bypasses.