CVE-2025-27997: n/a
An issue in Blizzard Battle.net v2.40.0.15267 allows attackers to escalate privileges via placing a crafted shell script or executable into the C:\ProgramData directory.
AI Analysis
Technical Summary
CVE-2025-27997 is a high-severity vulnerability identified in Blizzard Battle.net version 2.40.0.15267. The flaw allows an attacker to escalate privileges on a vulnerable system by placing a crafted shell script or executable into the C:\ProgramData directory. This directory is commonly used for application data accessible to all users, and improper handling of files placed here can lead to execution of malicious code with elevated privileges. The vulnerability is classified under CWE-427, which relates to uncontrolled search path elements, indicating that the application may be loading or executing files from a directory without proper validation or restrictions. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The attack vector is local (AV:L), meaning the attacker must have local access to the system to exploit this vulnerability. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges, potentially leading to full system compromise, data theft, or disruption of services. No patches or known exploits in the wild have been reported as of the publication date, but the vulnerability's nature and impact warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using Blizzard Battle.net client software, which is popular among gaming communities and potentially within some corporate environments for employee use or testing. Privilege escalation vulnerabilities can be leveraged by attackers who have gained limited access to a system to gain full administrative control, enabling them to bypass security controls, install persistent malware, exfiltrate sensitive data, or disrupt operations. In enterprises, this could lead to lateral movement within networks, impacting confidentiality and integrity of critical business information. Additionally, organizations with Bring Your Own Device (BYOD) policies or less controlled endpoints might be more exposed. The impact extends beyond gaming environments if the affected systems are part of broader IT infrastructure or if attackers use compromised machines as footholds for further attacks. Given the high CVSS score and the lack of required user interaction, the threat is particularly concerning for environments where local access can be obtained, such as shared workstations, cybercafés, or compromised user accounts.
Mitigation Recommendations
Organizations should immediately assess the presence of Blizzard Battle.net version 2.40.0.15267 on their systems and restrict local access to trusted users only. Since no official patch is currently available, temporary mitigations include: 1) Restrict write permissions to the C:\ProgramData directory to prevent unauthorized users from placing executable files or scripts. 2) Implement application whitelisting to block execution of unauthorized scripts or executables from non-standard locations. 3) Monitor the C:\ProgramData directory for unexpected file creation or modifications using endpoint detection and response (EDR) tools. 4) Employ least privilege principles to limit user permissions and reduce the risk of local privilege escalation. 5) Educate users about the risks of running untrusted software and the importance of reporting suspicious activity. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and patch management process. 7) Consider network segmentation to isolate gaming or non-critical systems from sensitive business networks to limit potential lateral movement.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Spain, Italy
CVE-2025-27997: n/a
Description
An issue in Blizzard Battle.net v2.40.0.15267 allows attackers to escalate privileges via placing a crafted shell script or executable into the C:\ProgramData directory.
AI-Powered Analysis
Technical Analysis
CVE-2025-27997 is a high-severity vulnerability identified in Blizzard Battle.net version 2.40.0.15267. The flaw allows an attacker to escalate privileges on a vulnerable system by placing a crafted shell script or executable into the C:\ProgramData directory. This directory is commonly used for application data accessible to all users, and improper handling of files placed here can lead to execution of malicious code with elevated privileges. The vulnerability is classified under CWE-427, which relates to uncontrolled search path elements, indicating that the application may be loading or executing files from a directory without proper validation or restrictions. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The attack vector is local (AV:L), meaning the attacker must have local access to the system to exploit this vulnerability. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges, potentially leading to full system compromise, data theft, or disruption of services. No patches or known exploits in the wild have been reported as of the publication date, but the vulnerability's nature and impact warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using Blizzard Battle.net client software, which is popular among gaming communities and potentially within some corporate environments for employee use or testing. Privilege escalation vulnerabilities can be leveraged by attackers who have gained limited access to a system to gain full administrative control, enabling them to bypass security controls, install persistent malware, exfiltrate sensitive data, or disrupt operations. In enterprises, this could lead to lateral movement within networks, impacting confidentiality and integrity of critical business information. Additionally, organizations with Bring Your Own Device (BYOD) policies or less controlled endpoints might be more exposed. The impact extends beyond gaming environments if the affected systems are part of broader IT infrastructure or if attackers use compromised machines as footholds for further attacks. Given the high CVSS score and the lack of required user interaction, the threat is particularly concerning for environments where local access can be obtained, such as shared workstations, cybercafés, or compromised user accounts.
Mitigation Recommendations
Organizations should immediately assess the presence of Blizzard Battle.net version 2.40.0.15267 on their systems and restrict local access to trusted users only. Since no official patch is currently available, temporary mitigations include: 1) Restrict write permissions to the C:\ProgramData directory to prevent unauthorized users from placing executable files or scripts. 2) Implement application whitelisting to block execution of unauthorized scripts or executables from non-standard locations. 3) Monitor the C:\ProgramData directory for unexpected file creation or modifications using endpoint detection and response (EDR) tools. 4) Employ least privilege principles to limit user permissions and reduce the risk of local privilege escalation. 5) Educate users about the risks of running untrusted software and the importance of reporting suspicious activity. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and patch management process. 7) Consider network segmentation to isolate gaming or non-critical systems from sensitive business networks to limit potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dfdf5c4522896dcc0ced6
Added to database: 5/21/2025, 4:23:17 PM
Last enriched: 7/7/2025, 12:40:23 PM
Last updated: 7/30/2025, 4:08:38 PM
Views: 12
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.