CVE-2025-10199: CWE-428: Unquoted Search Path or Element in LizardByte Sunshine for Windows
A local privilege escalation vulnerability exists in Sunshine for Windows (version v2025.122.141614 and likely prior versions) due to an unquoted service path.
AI Analysis
Technical Summary
CVE-2025-10199 is a local privilege escalation vulnerability identified in the Sunshine for Windows software developed by LizardByte, specifically affecting version v2025.122.141614 and likely earlier versions. The vulnerability arises from an unquoted service path, classified under CWE-428 (Unquoted Search Path or Element). In Windows environments, when a service executable path contains spaces but is not enclosed in quotes, the operating system may incorrectly parse the path and execute unintended binaries located in directories earlier in the search path. This can allow a local attacker with limited privileges to place a malicious executable in a strategically named folder or file path, which the system then executes with elevated service privileges. Since Sunshine for Windows runs as a service, exploitation of this vulnerability can lead to privilege escalation from a standard user to SYSTEM or administrative level. The vulnerability requires local access to the system but does not require user interaction beyond placing the malicious executable. No known public exploits have been reported yet, and no CVSS score has been assigned. The lack of a patch link suggests that a fix may not yet be publicly available or is pending. This vulnerability is significant because it leverages a common misconfiguration in Windows service paths, which can be exploited easily if local access is obtained, potentially compromising system integrity and confidentiality by allowing attackers to execute arbitrary code with high privileges.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially in environments where Sunshine for Windows is deployed. If exploited, attackers could gain elevated privileges on affected systems, enabling them to install persistent malware, access sensitive data, or disrupt operations. This is particularly critical for organizations handling sensitive personal data under GDPR, as unauthorized access could lead to data breaches and regulatory penalties. Additionally, privilege escalation vulnerabilities can serve as a stepping stone for lateral movement within corporate networks, increasing the risk of widespread compromise. The local nature of the vulnerability limits remote exploitation but does not diminish the risk in environments where insider threats or compromised user accounts exist. Organizations relying on Sunshine for Windows for remote desktop or streaming services may face operational disruptions if attackers leverage this vulnerability to disable or manipulate the service. The absence of known exploits in the wild provides a window for proactive mitigation but also underscores the need for vigilance as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first verify if Sunshine for Windows is installed and identify the affected versions. Immediate steps include: 1) Manually inspecting the service executable paths for unquoted spaces by using commands like 'sc qc <service_name>' and ensuring that all paths are properly quoted. 2) If unquoted paths are found, administrators should correct the service configuration by enclosing the executable paths in double quotes to prevent unintended execution paths. 3) Restrict write permissions on directories in the service path to prevent unauthorized users from placing malicious executables. 4) Monitor local user activities and audit service configurations regularly to detect unauthorized changes. 5) Implement strict local user privilege management to minimize the number of users with local access capable of exploiting this vulnerability. 6) Stay updated with vendor advisories for official patches or updates addressing this issue and apply them promptly once available. 7) Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to service execution and privilege escalation attempts. These targeted actions go beyond generic advice by focusing on the specific nature of unquoted service paths and local privilege escalation vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-10199: CWE-428: Unquoted Search Path or Element in LizardByte Sunshine for Windows
Description
A local privilege escalation vulnerability exists in Sunshine for Windows (version v2025.122.141614 and likely prior versions) due to an unquoted service path.
AI-Powered Analysis
Technical Analysis
CVE-2025-10199 is a local privilege escalation vulnerability identified in the Sunshine for Windows software developed by LizardByte, specifically affecting version v2025.122.141614 and likely earlier versions. The vulnerability arises from an unquoted service path, classified under CWE-428 (Unquoted Search Path or Element). In Windows environments, when a service executable path contains spaces but is not enclosed in quotes, the operating system may incorrectly parse the path and execute unintended binaries located in directories earlier in the search path. This can allow a local attacker with limited privileges to place a malicious executable in a strategically named folder or file path, which the system then executes with elevated service privileges. Since Sunshine for Windows runs as a service, exploitation of this vulnerability can lead to privilege escalation from a standard user to SYSTEM or administrative level. The vulnerability requires local access to the system but does not require user interaction beyond placing the malicious executable. No known public exploits have been reported yet, and no CVSS score has been assigned. The lack of a patch link suggests that a fix may not yet be publicly available or is pending. This vulnerability is significant because it leverages a common misconfiguration in Windows service paths, which can be exploited easily if local access is obtained, potentially compromising system integrity and confidentiality by allowing attackers to execute arbitrary code with high privileges.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially in environments where Sunshine for Windows is deployed. If exploited, attackers could gain elevated privileges on affected systems, enabling them to install persistent malware, access sensitive data, or disrupt operations. This is particularly critical for organizations handling sensitive personal data under GDPR, as unauthorized access could lead to data breaches and regulatory penalties. Additionally, privilege escalation vulnerabilities can serve as a stepping stone for lateral movement within corporate networks, increasing the risk of widespread compromise. The local nature of the vulnerability limits remote exploitation but does not diminish the risk in environments where insider threats or compromised user accounts exist. Organizations relying on Sunshine for Windows for remote desktop or streaming services may face operational disruptions if attackers leverage this vulnerability to disable or manipulate the service. The absence of known exploits in the wild provides a window for proactive mitigation but also underscores the need for vigilance as attackers may develop exploits once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first verify if Sunshine for Windows is installed and identify the affected versions. Immediate steps include: 1) Manually inspecting the service executable paths for unquoted spaces by using commands like 'sc qc <service_name>' and ensuring that all paths are properly quoted. 2) If unquoted paths are found, administrators should correct the service configuration by enclosing the executable paths in double quotes to prevent unintended execution paths. 3) Restrict write permissions on directories in the service path to prevent unauthorized users from placing malicious executables. 4) Monitor local user activities and audit service configurations regularly to detect unauthorized changes. 5) Implement strict local user privilege management to minimize the number of users with local access capable of exploiting this vulnerability. 6) Stay updated with vendor advisories for official patches or updates addressing this issue and apply them promptly once available. 7) Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to service execution and privilege escalation attempts. These targeted actions go beyond generic advice by focusing on the specific nature of unquoted service paths and local privilege escalation vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- certcc
- Date Reserved
- 2025-09-09T17:28:39.083Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c064ee22bccc7413ab98b3
Added to database: 9/9/2025, 5:33:34 PM
Last enriched: 9/9/2025, 5:35:32 PM
Last updated: 9/10/2025, 3:10:20 AM
Views: 5
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.