<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35535 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35535/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 03:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35535/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sudo Privilege Escalation Vulnerability (CVE-2026-35535)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sudo-privesc/</link><pubDate>Fri, 03 Apr 2026 03:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sudo-privesc/</guid><description>CVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.</description><content:encoded><![CDATA[<p>CVE-2026-35535 identifies a critical vulnerability within Sudo, specifically affecting versions up to 1.9.17p2 before commit 3e474c2. The vulnerability stems from a failure to properly handle errors during the privilege dropping process that occurs before running the mailer component. Specifically, if the setuid, setgid, or setgroups calls fail during this stage, the error is not treated as fatal. This flaw allows a malicious actor with limited privileges to potentially escalate their privileges to root or another privileged user. This vulnerability was reported in March 2026 and impacts systems relying on Sudo for privilege management, posing a significant risk to system integrity and confidentiality. Systems using affected versions of Sudo should be patched immediately to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with a low-privileged account.</li>
<li>Attacker identifies a vulnerable Sudo version (&lt;= 1.9.17p2).</li>
<li>Attacker crafts a malicious command intended to be executed via Sudo, specifically targeting the mailer functionality.</li>
<li>Sudo attempts to drop privileges using setuid, setgid, or setgroups before executing the mailer.</li>
<li>One of the privilege dropping calls (setuid, setgid, or setgroups) fails.</li>
<li>Due to the vulnerability, the failure is not treated as a fatal error, and Sudo continues execution with incomplete privilege dropping.</li>
<li>The mailer component executes with higher privileges than intended, as the privilege dropping was unsuccessful.</li>
<li>Attacker leverages the elevated privileges to execute arbitrary commands or modify system files, gaining full control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35535 can lead to complete system compromise. An attacker can gain root privileges, allowing them to install malware, exfiltrate sensitive data, or disrupt critical services. The vulnerability affects any system using a vulnerable version of Sudo, potentially impacting a wide range of organizations and individuals. The severity is high because it allows for unauthenticated privilege escalation on systems where the vulnerable version of Sudo is installed and improperly configured.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Sudo to a patched version (&gt;= 3e474c2) to remediate CVE-2026-35535.</li>
<li>Monitor system logs for failed setuid, setgid, or setgroups calls related to Sudo (see example Sigma rule below).</li>
<li>Implement stricter privilege management policies to minimize the impact of potential privilege escalation vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sudo</category><category>privilege-escalation</category><category>cve-2026-35535</category></item></channel></rss>