Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10198: CWE-427 Uncontrolled Search Path Element in LizardByte Sunshine for Windows

0
High
VulnerabilityCVE-2025-10198cvecve-2025-10198cwe-427
Published: Tue Sep 09 2025 (09/09/2025, 17:28:14 UTC)
Source: CVE Database V5
Vendor/Project: LizardByte
Product: Sunshine for Windows

Description

Sunshine for Windows, version v2025.122.141614, contains a DLL search-order hijacking vulnerability, allowing attackers to insert a malicious DLL in user-writeable PATH directories.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:02:31 UTC

Technical Analysis

CVE-2025-10198 is a DLL search-order hijacking vulnerability classified under CWE-427, affecting LizardByte's Sunshine for Windows version v2025.122.141614. The vulnerability stems from the application loading dynamic link libraries (DLLs) from directories included in the system PATH environment variable that are writable by standard users. This uncontrolled search path element allows an attacker with local access to place a malicious DLL in one of these directories. When the vulnerable application loads the DLL, it inadvertently executes the attacker's code with the privileges of the user running Sunshine. The CVSS 3.1 base score is 7.8 (high), reflecting high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, no privileges required, but requiring user interaction. The vulnerability does not currently have known exploits in the wild, and no patches have been published. This type of DLL hijacking can be leveraged for privilege escalation, persistence, or lateral movement within a network. The root cause is improper handling of DLL search paths, where user-writable directories are included without validation or restrictions. This vulnerability highlights the importance of secure DLL loading practices and environment hygiene in Windows applications.

Potential Impact

For European organizations, the impact of CVE-2025-10198 can be significant, especially in environments where LizardByte Sunshine for Windows is deployed. Successful exploitation can lead to execution of arbitrary code with user-level privileges, potentially escalating to higher privileges if combined with other vulnerabilities or misconfigurations. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and persistence of malware. Organizations with shared or multi-user systems are particularly at risk, as attackers can place malicious DLLs in user-writable PATH directories. The confidentiality, integrity, and availability of critical systems can be compromised, affecting business operations and compliance with data protection regulations such as GDPR. Additionally, the requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The lack of a patch increases the urgency for immediate mitigation measures to prevent exploitation.

Mitigation Recommendations

1. Immediately audit and restrict write permissions on all directories included in the system PATH environment variable to prevent unauthorized DLL placement. 2. Remove any user-writable directories from the PATH environment variable, especially those that are writable by non-administrative users. 3. Employ application whitelisting and code integrity policies (e.g., Windows Defender Application Control) to restrict execution of unauthorized DLLs. 4. Monitor file system changes in PATH directories and use endpoint detection and response (EDR) tools to detect suspicious DLL loads or modifications. 5. Educate users about the risks of executing or interacting with untrusted applications or files to reduce the likelihood of triggering the vulnerability. 6. Engage with LizardByte to obtain patches or updates and plan for timely deployment once available. 7. Consider isolating or sandboxing the Sunshine application to limit the impact of potential exploitation. 8. Regularly review environment variables and application configurations to ensure secure DLL loading practices are enforced.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
certcc
Date Reserved
2025-09-09T17:25:14.481Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c064ee22bccc7413ab98b0

Added to database: 9/9/2025, 5:33:34 PM

Last enriched: 11/3/2025, 7:02:31 PM

Last updated: 12/15/2025, 4:05:19 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats