EUVD-2026-18571

| CVE-2026-35535 HIGH
2026-04-03 mitre GHSA-g5fc-f834-rcr2
7.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Apr 03, 2026 - 02:30 euvd
EUVD-2026-18571
Analysis Generated
Apr 03, 2026 - 02:30 vuln.today
CVE Published
Apr 03, 2026 - 02:21 nvd
HIGH 7.4

Description

In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.

Analysis

Privilege escalation to root in Sudo ≤1.9.17p2 occurs when setuid/setgid/setgroups system calls fail during the mailer privilege-drop sequence, allowing local attackers with high complexity exploitation to gain full system control. Confirmed actively exploited (CISA KEV). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all systems running Sudo ≤1.9.17p2 using 'sudo --version' and isolate or restrict local user access on critical systems. Within 7 days: Review sudo configuration files for mailer settings (especially in sudoers); disable the mailer feature if not operationally required, or restrict sudo execution via AppArmor/SELinux profiles to limit privilege escalation impact. …

Sign in for detailed remediation steps.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +37
POC: 0

Share

EUVD-2026-18571 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy