Title:Linux Sudo Chroot Execution Status:experimental Description:Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution.
Attackers may use this technique to evade detection and execute commands in a modified environment.
This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463.
While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.
References: -https://github.com/kh4sh3i/CVE-2025-32463/blob/81bb430f84fa2089224733c3ed4bfa434c197ad4/exploit.sh Author: Swachchhanda Shrawn Poudel (Nextron Systems) Date: 2025-10-02 modified:None Tags:
condition:selection Falsepositives:
-Legitimate administrative tasks or scripts that use 'sudo --chroot' for containerization, testing, or system management. Level:low