CVE-2025-32463
Published Jun 30, 2025
Last updated 4 months ago
- Description
- Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- sudo, ubuntu_linux, debian_linux, leap, enterprise_linux, linux_enterprise_desktop, linux_enterprise_real_time, linux_enterprise_server_for_sap
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability
- Exploit added on
- Sep 29, 2025
- Exploit action due
- Oct 20, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- cve@mitre.org
- CWE-829
- Hype score
- Not currently trending
New HackTheBox walkthrough: Expressway UDP enumeration → IPsec IKE aggressive mode → PSK cracking → CVE-2025-32463 sudo privilege escalation. VPN pentesting meets modern privesc. https://t.co/Fb7kqDNJAt #HackTheBox #VPN #IPsec https://t.co/EGVviOTnEE
@Strikoder
7 Mar 2026
132 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【結論】sudo脆弱性(CVE-2025-32463)は、まずアップデートが最優先です。 sudo 1.9.17p1より前が影響範囲とされていて、ローカルユーザーからroot権限に繋がる可能性があります(出典:NVD 2025/06/30)。 ※深刻度
@Linuxmaster_JP
4 Feb 2026
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
2025年 実際に悪用された高リスク脆弱性 Top10 1 Langflow 未認証コード実行 CVE-2025-3248 2 Microsoft SharePoint Server RCE(ToolShell) CVE-2025-53770 / CVE-2025-53771 3 sudo 権限昇格(chroot処理不備) CVE-2025-32463 4 Docker Desktop コンテ
@yousukezan
1 Jan 2026
1476 Impressions
1 Retweet
15 Likes
7 Bookmarks
0 Replies
0 Quotes
#eBPF Last week at Cisco Isovalent. Great to see PoC #eBPF CVEs protections maturing into real Features/Products Tetragon Cisco Live Protect. From kernel CVEs patching/protecting to userspace -> sudo instant root CVE-2025-32463 protection. Though https://t.co/zFI7xKfdnh
@tixxdz
9 Dec 2025
33 Impressions
0 Retweets
1 Like
1 Bookmark
1 Reply
0 Quotes
ZERO-DAY ALERT: HACKERS ARE STEALING ROOT! Critical sudo Flaw (CVE-2025-32463) Lets Any Local User Instantly Hijack Linux/Unix Servers Read the full report on - https://t.co/KJRsJQ6lxm https://t.co/4GPO58DZh9
@cyberbivash
13 Nov 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
That sudo command you use daily? CVE-2025-32463 just made it a security nightmare CVSS 9.3 | Actively exploited | Affects sudo 1.9.14-1.9.17 Check: sudo --version Fix: sudo apt update && sudo apt upgrade sudo Even MY patched Kali was in the vulnerable range. Check your
@Jolandadekoff
26 Oct 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Exploit just dropped for CVE-2025-32463 (Sudo Local Privilege Escalation) This makes static binary for easier use and deployment. Check out the code: https://t.co/l8z3wT6HLA #CVE #CVE_2025_32463 #Sudo #LPE #Golang #Go #Exploit #Security #Infosec
@Nowafen
24 Oct 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - Nowafen/CVE-2025-32463: This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access. https://t.co/1DF2oMmYxE
@akaclandestine
19 Oct 2025
2182 Impressions
12 Retweets
28 Likes
11 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-32463
@transilienceai
16 Oct 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
#exploit 1⃣. CVE-2025-32463: LPE to Root via Sudo chroot in Linux - https://t.co/tPtqOQHYJ8 2⃣. CVE-2025-61984: Exploiting SSH via ProxyCommand - https://t.co/2HOWbhgb98 3⃣. CVE-2025-9961: TP-Link CWMP Service RCE - https://t.co/a4Iktctz7h 4⃣. Exploit development for
@ksg93rd
15 Oct 2025
1216 Impressions
6 Retweets
15 Likes
7 Bookmarks
0 Replies
0 Quotes
⚠️🥷 Una nueva PoC de exploit fue publicada, para explotar la vulnerabilidad crítica de escalada de privilegios, Chroot de Sudo. Sudo, función ampliamente utilizada, ha sido objeto de alerta, tras la publicación de un exploit. CVE-2025-32463 (CVSS 9.3 - crítico) https:
@ciberseguridadx
14 Oct 2025
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ورژن های آسیب پذیر کامند Sudo با کد شناسایی CVE-2025-32463 در توزیع های مختلف لینوکس https://t.co/02kgKMncnl https://t.co/ezq4TxNrKO
@EthicalSafe
14 Oct 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔥 Detection for Sudo Chroot Privilege Escalation (CVE-2025-32463) Deploy this behavioral KQL detection to identify exploitation attempts targeting the chroot feature in Sudo versions 1.9.14 through 1.9.17. This vulnerability allows local attackers to escalate privileges to ro
@0x534c
14 Oct 2025
2729 Impressions
12 Retweets
48 Likes
16 Bookmarks
0 Replies
0 Quotes
🛠️ PoC CVE-2025-32463 LPE→Root Local Privilege Escalation to Root via Sudo chroot in Linux https://t.co/AZK1Vc8Yos https://t.co/vXW5XhuDUU
@IntCyberDigest
13 Oct 2025
18208 Impressions
78 Retweets
339 Likes
151 Bookmarks
4 Replies
0 Quotes
🚨 Alert: Critical vulnerabilities in sudo (CVE-2025-32462 & CVE-2025-32463) allow local attackers to escalate privileges to root on Linux/macOS systems. CVE-2025-32463 is actively exploited! Update to sudo 1.9.17p1 immediately. #CyberSecurity #Linux @linuxtoday @linuxopsy
@The_Hunt_x
11 Oct 2025
86 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Released a Nuclei template for CVE-2025-32463 (Sudo EoP exploit). Details & files: https://t.co/xnoWr66zqz @pdnuclei https://t.co/KrKOOAT5tP
@_ricardomaia
9 Oct 2025
122 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access because / etc /nsswitch. conf from a user-controlled directory is used with the --chroot option. #bugbounty #cybersecurity https://t.co/bxkvQ3h1V3
@NullSecurityX
7 Oct 2025
6800 Impressions
31 Retweets
149 Likes
47 Bookmarks
0 Replies
0 Quotes
CISA advierte sobre grave vulnerabilidad en Linux Sudo explotada en ataques https://t.co/AVOKBAyR4I La Agencia de Ciberseguridad e Infraestructura de EE. UU. (CISA) ha emitido una alerta sobre una vulnerabilidad crítica en Sudo —identificada como CVE-2025-32463— que permite
@laboratoriolinu
6 Oct 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. PoC: https://t.co/eibqzoNqo3 CVSS: 9.3 Affected Versions: ▪️Vulnerable: sudo 1.9.14 – 1.9.17 https
@DarkWebInformer
5 Oct 2025
40589 Impressions
125 Retweets
617 Likes
332 Bookmarks
3 Replies
5 Quotes
هشدار CISA درباره آسیبپذیری بحرانی Linux Sudo که در حملات مورد سوءاستفاده قرار گرفته هکرها به طور فعال در حال سوءاستفاده از آسیبپذیری بحرانی (CVE-2025-32463) در بست
@Teeegra
2 Oct 2025
1922 Impressions
5 Retweets
31 Likes
5 Bookmarks
0 Replies
0 Quotes
CISA: Critical Sudo Flaw CVE-2025-32463 Requires Immediate Action #Security #Linux https://t.co/ajYigeMpsf
@gnoppixlinux
2 Oct 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE of the Week 🐿️⚡️ A high-severity vulnerability, CVE-2025-32463, has been identified in Sudo 🥪. This flaw lets a local attacker abuse sudo --chroot so that a user-controlled /etc/nsswitch.conf is used inside the chroot, enabling privilege escalation to root. ⚠
@vicariusltd
2 Oct 2025
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Threat Digest – 2025-10-02 KEV: CVE-2025-32463 — Sudo Inclusion of Functionality NVD: CVE-2025-41421 — Improper handling of symbolic News: Android spyware campaigns impersonate Signal and… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv
@dpharristech
2 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Sudo has released a security update to address a critical vulnerability (CVE-2025-32463) in its Sudo command-line utility versions 1.9.14 to 1.9.17. Read more: https://t.co/JRZpvnvo3F https://t.co/lt5Vqk2J8R
@CSAsingapore
2 Oct 2025
225 Impressions
4 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
sudoは「Super Userの名のもとに命じる」という意味で、誰にでも使えるものではないが、使えると何でも出来てしまう、かなり強い詠唱方法。 米CISA、Sudoの重大な脆弱性について警告を発出 LinuxおよびUnixシス
@zubora_engineer
2 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA alerta sobre falha crítica no comando "sudo" do Linux explorada em ataques: a vulnerabilidade CVE-2025-32463 permite a execução de comandos com privilégios de root utilizando a opção -R (--chroot), mesmo que o usuário nã... Leia mais em: https://t.co/SVBiKZI5Fj
@YuriBigSur
1 Oct 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Threat Digest – 2025-10-01 KEV: CVE-2025-32463 — Sudo Inclusion of Functionality NVD: CVE-2025-34217 — Vasion Print formerly PrinterLogic News: Microsoft: Media Creation Tool broken on… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv
@dpharristech
1 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA added CVE-2025-32463, a critical sudo flaw (CVSS 9.3) to Known Exploited Vulnerabilities. Vulnerable to local attackers on sudo <1.9.17p1 using --chroot for root access. Federal agencies to patch by Oct 20; all update sudo to
@bigmacd16684
1 Oct 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA alerta: falha crítica no sudo (CVE-2025-32463) permite escalada a root via -R/--chroot em sudo 1.9.14–1.9.17 — atualize para 1.9.17p1 ou aplique mitigação. Órgãos federais têm até 20/10. #infosec #linux https://t.co/cBS90Q8x7a
@EloViral
1 Oct 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 #CISA warns: CVE-2025-32463 in sudo actively exploited. Affects sudo 1.9.14–1.9.17 on #Linux. Escalates local user → root via --chroot + NSS. ⚠️ Patch to 1.9.17p1+ now. Hunt for “CHROOT=” in syslog. 🔗: https://t.co/HevKFKOY4K
@socradar
1 Oct 2025
175 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🗞️ @CISACyber has added a critical vulnerability in the Sudo utility to its Known Exploited Vulnerabilities (KEV) catalog, indicating that it is actively being exploited. The flaw (CVE-2025-32463) could allow a local attacker to gain root privileges on Linux and Unix-like sy
@gossy_84
1 Oct 2025
139 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
🚨 CVE-2025-32463: vulnerabilidad crítica en sudo 👉 Escalada local a ROOT en Linux/macOS ⚠️ Exploit ya en circulación ✅ Actualiza a 1.9.17p1 💼 En MMarcoSeguridad y CiberseguridadOnline24h te ayudamos a protegerte 24/7 #Ciberseguridad #Linux #Sudo #CVE202532463 htt
@MMarcoSeguridad
1 Oct 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT PATCH! CISA KEV ALERT! The critical Linux Sudo Flaw (CVE-2025-32463) has been added to the Known Exploited Vulnerabilities catalog. Attackers are gaining Local Privilege Escalation to Root right now. Read the full report on - https://t.co/X7MvTkTzey https://t.co/OucOt0R7PT
@cyberbivash
1 Oct 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Sudoの脆弱性 CVE-2025-32463 chrootを使った権限昇格 CVSS:7.8(v3) 7月に公開された脆弱性が悪用ありとしてKVEに載ったもの。PoCコードが出ており、非常に簡単に悪用が可能。 ただし対象バージョンは狭く、RHELなら10以
@GenKa_232
1 Oct 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAが警告するLinuxとUnixのSudoに関する重大な脆弱性(CVE-2025-32463) https://t.co/JmJkra4tYd #Security #セキュリティー #ニュース
@SecureShield_
1 Oct 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA ha alertado sobre la explotación activa de la vulnerabilidad CVE-2025-32463 en Sudo, permitiendo a atacantes locales sin privilegios escalar a root. El fallo ya cuenta con parches disponibles y ha sido incluido en el catálogo de amenazas activas. https://t.co/drX8LGnCas h
@DerechodelaRed
30 Sept 2025
1207 Impressions
9 Retweets
11 Likes
4 Bookmarks
0 Replies
0 Quotes
CISA ALERT: IMMEDIATE PATCH! The actively exploited Sudo 'Chroot to Root' Flaw (CVE-2025-32463) grants unauthorized escalation to root privileges on Linux systems. If you run Sudo, you are exposed right now. Read full report on - https://t.co/j4tJ2JZNRZ https://t.co/nPddaj4vna
@cyberbivash
30 Sept 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warns of critical Linux Sudo flaw exploited in attacks Hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo package that enables the… https://t.co/xugThCupAL https://t.co/DeGES4HX2i
@DConsultinguk
30 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Threat Digest – 2025-09-30 KEV: CVE-2025-32463 — Sudo Inclusion of Functionality NVD: CVE-2025-57428 — Default credentials in Italy News: Microsoft fixes Windows DRM video playback… #cybersecurity #infosec #CVE More: https://t.co/J1fpKfnDnv
@dpharristech
30 Sept 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds CVE-2025-32463 to its KEV list—this critical Sudo flaw lets local attackers run commands as root via the --chroot option, even without sudoers permissions. Patch before Oct 20. 🛠️🐧 #SudoExploit #CISAWarning https://t.co/xPevI4oU7w
@manuelbissey
30 Sept 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
La CISA alerte sur une vulnérabilité critique affectant SUDO et activement exploitée (CVE-2025-32463 / score CVSS : 9,3) https://t.co/zr7qdqq7xd
@bluetouff
30 Sept 2025
3867 Impressions
19 Retweets
20 Likes
3 Bookmarks
5 Replies
0 Quotes
GitHub - pr0v3rbs/CVE-2025-32463_chwoot: Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 https://t.co/8km6uENFlY
@akaclandestine
30 Sept 2025
1373 Impressions
4 Retweets
15 Likes
13 Bookmarks
0 Replies
0 Quotes
🚨 CISA warns: critical Sudo flaw under active attack #CISA added CVE-2025-32463 (CVSS 9.3) to its known exploited list. The bug lets local users exploit sudo’s “-R” (chroot) to run root commands - even if absent in sudoers. Patch before Oct 20 to limit damage. #ransom
@ransomnews
30 Sept 2025
279 Impressions
0 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
米CISAはLinux系で使われるSudoに存在する重大脆弱性CVE-2025-32463を「既知の悪用脆弱性(KEV)」カタログに追加。sudoの-Rオプション処理に起因し、sudoersに記載されていなくてもローカル攻撃者がroot権限で任意コ
@yousukezan
30 Sept 2025
10216 Impressions
36 Retweets
101 Likes
51 Bookmarks
0 Replies
0 Quotes
CVE-2025-32463 (gravedad critica 9.3) CISA, alerto de esta nueva vuln crítica, de escalado de privilegios en local Linux, a través de la opción -R (--chroot) #sudo, versiones anteriores a 1.9.17p1, permite a los usuarios locales obtener acceso root https://t.co/WxYHC3H9nz
@antonio_taboada
30 Sept 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 A critical flaw in Sudo (CVE-2025-32463) could expose your Linux systems to root access! With a CVSS score of 9.3, this is a serious risk for enterprises! ⚠️ #Cybersecurity #Linux https://t.co/kMWmd9p3kf
@Cyb3r_5wift
30 Sept 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warns of a critical Sudo flaw (CVE-2025-32463) actively exploited in Linux & Unix systems. Update now! 🚨 https://t.co/mVXds67QgL #Sudo #LinuxSecurity #Cybersecurity #CISA #Vulnerability
@0xT3chn0m4nc3r
30 Sept 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 أصدرت وكالة الأمن السيبراني الأميركية (CISA) تحذيرًا بشأن ثغرة حرجة في أداة سدو المستخدمة في أنظمة لينكس واليونيكس، والتي تم إضافتها إلى قائمة الثغرات ا
@Cybercachear
30 Sept 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Linux/Unix alert: CISA just flagged a critical Sudo flaw (CVE-2025-32463, CVSS 9.3) now exploited in the wild. Attackers can hijack sudo’s --chroot option to run arbitrary commands as root—even if not in sudoers. Details → https://t.co/GByY6lByWs
@TheHackersNews
30 Sept 2025
82288 Impressions
146 Retweets
393 Likes
156 Bookmarks
17 Replies
17 Quotes
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-32463 #Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability https://t.co/CGzkn4jZFk
@ScyScan
29 Sept 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91CD68ED-9A18-47B6-91E5-C20D2F69AB65",
"versionEndExcluding": "1.9.17",
"versionStartIncluding": "1.9.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*",
"matchCriteriaId": "B563C690-EE9A-437C-9410-54209F82F827",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "BF90B5A4-6E55-4369-B9D4-E7A061E797D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*",
"matchCriteriaId": "418A8B25-A287-4218-A10E-F9345A8E2EB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*",
"matchCriteriaId": "6B40C5AB-76D5-44E1-A571-B9A44522C6BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "204FC6CC-9DAC-45FB-8A9F-C9C8EDD29D54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "78B4F1C7-A301-4C94-A41C-A51182B83677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*",
"matchCriteriaId": "B83183BD-A440-4697-8DD8-8A478C428984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*",
"matchCriteriaId": "B4388826-A383-4FBA-819A-363EAF6183DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4B0AC584-5E26-4ACE-BC19-9E69A302F238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*",
"matchCriteriaId": "E8772290-7B8F-4FF3-8114-0535E84E10F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*",
"matchCriteriaId": "BF782A24-9E6B-4897-9402-37DBCA7A7332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*",
"matchCriteriaId": "44807632-7775-4496-9217-5F5816943D29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*",
"matchCriteriaId": "2F46E618-B5F5-4CA1-8023-8E9C3E1772A2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]