Description
In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.
Published: 2026-04-03
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

A failure of the setuid, setgid, or setgroups system call during a privilege‑dropping step before the mailer is executed means the error is ignored and the process can continue with elevated privileges. This flaw allows a non‑root user who can invoke the mailer to retain root rights, granting the attacker full system control. The weakness aligns with authorization and privilege‑dropping errors, reflected by CWE‑271 and CWE‑272.

Affected Systems

The vulnerability affects all releases of the Sudo project through version 1.9.17p2 prior to the commit 3e474c2. Any system running that version of Sudo and with the mailer feature enabled is vulnerable.

Risk and Exploitability

The CVSS score of 7.4 indicates a high impact, but the EPSS score of less than 1% suggests a low probability of exploitation in the wild. Because the flaw is triggered by attempting to drop privileges during mailer execution, the attack vector is most likely local, requiring the ability to run a command via sudo that invokes the mailer. The issue is not listed in the CISA KEV catalog and no public exploit has been reported; however, an attacker with local sudo access can immediately gain root privileges if the flaw is present.

Generated by OpenCVE AI on April 4, 2026 at 04:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Sudo to a version that includes commit 3e474c2 or later, ensuring proper privilege dropping during mailer execution.
  • If an update is not possible, configure sudoers to disable the mailer feature or restrict which users can invoke it, thereby reducing the attack surface.
  • Verify that privilege drops are functioning correctly by inspecting system logs for setuid failures and testing "sudo -l -v" to confirm no unintended elevation.
  • Implement host‑based intrusion detection and audit controls to detect anomalous privilege escalation attempts.

Generated by OpenCVE AI on April 4, 2026 at 04:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Non‑fatal Group Privilege Drop in Sudo sudo: Sudo: Privilege escalation due to failure in privilege drop calls
Weaknesses CWE-272
References
Metrics threat_severity

None

threat_severity

Important


Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Non‑fatal Group Privilege Drop in Sudo
First Time appeared Sudo Project
Sudo Project sudo
Vendors & Products Sudo Project
Sudo Project sudo

Fri, 03 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Description In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.
Weaknesses CWE-271
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sudo Project Sudo
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-04T03:55:19.379Z

Reserved: 2026-04-03T02:21:32.829Z

Link: CVE-2026-35535

cve-icon Vulnrichment

Updated: 2026-04-03T13:14:56.484Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T03:16:18.233

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35535

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-03T02:21:33Z

Links: CVE-2026-35535 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:13Z

Weaknesses