[SA-0009] - sudo Privledge Esclation

Dear Valued Sippy Customer,

A security vulnerability was reported in the FreeBSD operating system. Two significant vulnerabilities were identified in Linux and Mac OS systems allowing local users to quickly esclate privledges, disable security measures, and move deeper into the network. Those vulnerabilities are detailed below. A patched version of sudo will be available to to be rolled out as early as July 21st, 2025 to our Customers. Please contact our support team to schedule an update.

A closer look at each vulnerability

CVE-2025-32462 — “Policy-Check Flaw”

The -h / –host option in sudo was intended only for sudo -l (listing privileges). In affected versions, it could be added to any command. This tricked sudo into thinking it was on a permitted host, allowing someone with even minimal sudo access to run commands as root, bypassing host-specific rules.

The fix ensures -h is rejected unless used with -l.

CVE-2025-32463 — “chroot to root”

This issue involves sudo’s -R / –chroot option. Older versions would switch into the specified directory before fully evaluating privileges. An attacker could prepare a writable directory (for example under /tmp), place a fake /etc/nsswitch.conf and a malicious libnss_*.so library there, and then invoke sudo. Sudo would load the attacker’s code as root.

The latest sudo release disables this chroot behavior during policy checks.

Affected Versions and Resolution Plan

We have outlined who and what steps are needed for our customers to address this security concern. The corrective steps will depend on what version of software you are using as well as the signalling package that is currently in use. The table below will outline that for you.

Product Version Resolution Plan
Sippy Softswitch 2020 update to the latest Sippy Softswitch 2021
Sippy Softswitch 2021 Update to the latest Sippy Softswitch 2021
Sippy Softswitch 2022 Update to the latest Sippy Softswitch 2022
Sippy Softswitch 2023 Update to the latest Sippy Softswitch 2023
Sippy Freightswitch Testing Update to the latest Version

Next steps

Customers on Flex Licenses and Active Support agreements will be eligible for the patch and will be performed on a priority basis. Customers on Sippy Softswitch v2020 or earlier or do not currently have a support agreement are directed to contact sales@sippysoft.com for further instructions.

Sincerely,

Phillip Ma

Product Manager

Sippy Software.