LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CVE DATABASE  /  CVE-2021-3156

CVE-2021-3156

Sudo Heap-Based Buffer Overflow Vulnerability

CVSS 7.8 · HIGH ⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog

Confirmed exploited in the wild. Added 2022-04-06. Federal remediation due 2022-04-27.
Required action: Apply updates per vendor instructions.

Summary

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

CVSS 3.1 breakdown

Base score7.8 (HIGH)
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack vectorLOCAL
Attack complexityLOW
Privileges requiredLOW
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
IntegrityHIGH
AvailabilityHIGH

Weakness type (CWE)

Affected products

Sudo_project sudoFedoraproject fedoraDebian debian linuxNetapp active iq unified managerNetapp cloud backupNetapp hci management nodeNetapp oncommand unified manager core packageNetapp ontap select deploy administration utilityNetapp ontap toolsNetapp solidfireMcafee web gatewaySynology diskstation manager unified controllerSynology diskstation managerSynology skynas firmwareSynology skynasSynology vs960hd firmwareSynology vs960hdBeyondtrust privilege management for macBeyondtrust privilege management for unix\/linuxOracle micros compact workstation 3 firmware
Check this CVE live

Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.

References

Data: NIST NVD + CISA KEV. NVD last modified 2025-11-10. Always verify against the vendor advisory before acting.

Scroll to Top