Expressway is an easy-difficulty Hack The Box machine that starts with an exposed IKE/IPsec VPN service running in aggressive mode. By extracting the pre-shared key hash from the IKE handshake and cracking it offline, we recover credentials that also work for SSH access. Privilege escalation leverages CVE-2025-32463, a local privilege escalation vulnerability in Sudo 1.9.17 that abuses chroot handling to gain a root shell.
Expressway-info-card
Reconnaissance
We begin with a UDP scan since the machineβs open services are not on typical TCP ports:
1 2 3 4 5
PORT STATE SERVICE 68/udp open|filtered dhcpc 69/udp open|filtered tftp 500/udp open isakmp 4500/udp open|filtered nat-t-ike
Port 500 (ISAKMP) and 4500 (NAT-T) immediately stand out β these are associated with IPsec/IKE VPN services. The presence of both ports suggests an IPsec VPN endpoint configured for NAT traversal.
IKE Aggressive Mode Enumeration
Using ike-scan, we probe the VPN service in aggressive mode to extract configuration details and identity information:
kujen@kujen:~$ ssh [email protected] The authenticity of host '10.10.11.87 (10.10.11.87)' can't be established. ED25519 key fingerprint is SHA256:fZLjHktV7oXzFz9v3ylWFE4BS9rECyxSHdlLrfxRM8g. This key is not known by any other names. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '10.10.11.87' (ED25519) to the list of known hosts. [email protected]'s password: Last login: Thu Sep 25 04:19:01 BST 2025 from 10.10.14.13 on ssh Linux expressway.htb 6.16.7+deb14-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.16.7-1 (2025-09-11) x86_64
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Thu Sep 25 04:39:45 2025 from 10.10.16.8 ike@expressway:~$ cat user.txt 36dd558a9f8b3b7e02b7ca0b07c333ad ike@expressway:~$
The password was reused between the VPN PSK and the userβs SSH account β a common misconfiguration in real environments.
Privilege Escalation β CVE-2025-32463
Checking the Sudo version on the box:
1 2 3 4 5 6
ike@expressway:~$ sudo -V Sudo version 1.9.17 Sudoers policy plugin version 1.9.17 Sudoers file grammar version 50 Sudoers I/O plugin version 1.9.17 Sudoers audit plugin version 1.9.17
Sudo 1.9.17 is vulnerable to CVE-2025-32463 , a local privilege escalation vulnerability that exploits how Sudo handles chroot operations. When a sudoers rule allows running a command with CHROOT set, it can be abused to escalate to root by manipulating the chroot environment to load a malicious shared library or binary.
IKE Aggressive Mode exposes identity and PSK hash material to any host that can reach port 500/udp. Always prefer main mode when PSK authentication is required.
Credential reuse between a VPN pre-shared key and user SSH passwords is a critical operational security failure.
CVE-2025-32463 demonstrates that even Sudo, one of the most audited utilities in Linux, can introduce local privilege escalation paths through chroot handling edge cases. Keep Sudo updated.
That was it for Expressway, hope you learned something new!