Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10198: CWE-427 Uncontrolled Search Path Element in LizardByte Sunshine for Windows

0
High
VulnerabilityCVE-2025-10198cvecve-2025-10198cwe-427
Published: Tue Sep 09 2025 (09/09/2025, 17:28:14 UTC)
Source: CVE Database V5
Vendor/Project: LizardByte
Product: Sunshine for Windows

Description

Sunshine for Windows, version v2025.122.141614, contains a DLL search-order hijacking vulnerability, allowing attackers to insert a malicious DLL in user-writeable PATH directories.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:33:35 UTC

Technical Analysis

CVE-2025-10198 is a DLL search-order hijacking vulnerability classified under CWE-427, affecting LizardByte's Sunshine for Windows version v2025.122.141614. The vulnerability stems from the software's reliance on the Windows DLL search path, which includes directories that are writable by standard users. Attackers with local access can exploit this by placing a malicious DLL in one of these writable PATH directories. When Sunshine for Windows loads DLLs, it may inadvertently load the malicious DLL instead of the legitimate one, leading to arbitrary code execution with the privileges of the user running the application. The CVSS 3.1 base score of 7.8 reflects a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and requiring user interaction (UI:R). The impact is severe, affecting confidentiality, integrity, and availability (all rated high). Although no public exploits are known at this time, the vulnerability presents a significant risk due to the ease of exploitation once local access is obtained. The vulnerability is particularly dangerous in environments where users have write access to PATH directories and where Sunshine for Windows is used, potentially enabling privilege escalation or persistent malware installation. The lack of available patches at the time of publication necessitates immediate mitigation through configuration and operational controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors where Sunshine for Windows is deployed for remote desktop or streaming services. Successful exploitation can lead to unauthorized code execution, data breaches, and system compromise, impacting confidentiality, integrity, and availability of critical systems. Organizations with multi-user environments or shared workstations are particularly vulnerable due to the writable PATH directories. The threat could facilitate lateral movement within networks or persistent footholds for attackers. Given the high CVSS score and the nature of the vulnerability, the potential impact includes disruption of business operations, data theft, and damage to organizational reputation. The absence of known exploits reduces immediate risk but does not diminish the urgency for mitigation. European entities in finance, government, and critical infrastructure sectors using this software are at heightened risk due to the sensitive nature of their data and systems.

Mitigation Recommendations

1. Immediately audit and remove any user-writable directories from the system PATH environment variable to prevent malicious DLL placement. 2. Restrict write permissions on directories included in the PATH to trusted administrators only. 3. Implement application whitelisting and DLL integrity verification to detect and block unauthorized DLLs. 4. Monitor file system changes in PATH directories for suspicious activity using endpoint detection and response (EDR) tools. 5. Educate users about the risks of executing untrusted applications and the importance of avoiding unnecessary user interaction that could trigger exploitation. 6. Isolate systems running Sunshine for Windows in segmented network zones to limit lateral movement if compromised. 7. Engage with LizardByte for patches or updates addressing this vulnerability and plan prompt deployment once available. 8. Employ least privilege principles to minimize the impact of potential exploitation. 9. Regularly review and update security policies regarding environment variable management and software installation practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
certcc
Date Reserved
2025-09-09T17:25:14.481Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c064ee22bccc7413ab98b0

Added to database: 9/9/2025, 5:33:34 PM

Last enriched: 1/20/2026, 7:33:35 PM

Last updated: 2/7/2026, 8:46:30 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats