Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61973: CWE-284: Improper Access Control in Epic Games Epic Games Store

0
High
VulnerabilityCVE-2025-61973cvecve-2025-61973cwe-284
Published: Thu Jan 15 2026 (01/15/2026, 15:19:48 UTC)
Source: CVE Database V5
Vendor/Project: Epic Games
Product: Epic Games Store

Description

A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.

AI-Powered Analysis

AILast updated: 01/15/2026, 15:47:44 UTC

Technical Analysis

CVE-2025-61973 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Epic Games Store version 14.6.2.0 during its installation process via the Microsoft Store on Windows platforms. The flaw arises because the installer does not adequately restrict access to a DLL file that is loaded during installation, allowing a low-privilege user to replace this DLL with a malicious one. This DLL hijacking leads to local privilege escalation, enabling the attacker to execute code with elevated privileges, potentially SYSTEM level. The vulnerability does not require user interaction beyond initiating the installation and can be exploited by any user with low privileges on the system. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can gain control over the system, manipulate sensitive data, or disrupt system operations. While no public exploits are known yet, the vulnerability's nature and the widespread use of Epic Games Store make it a critical concern. The vulnerability was reserved in October 2025 and published in January 2026, with no patches currently listed, indicating that mitigation relies on vendor updates and local security controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Epic Games Store is installed on shared or multi-user Windows systems. An attacker with low privileges could escalate to administrative rights, compromising system security, stealing sensitive data, or deploying malware. This could lead to operational disruptions, data breaches, and loss of trust. Gaming companies, educational institutions, and enterprises with gaming on employee devices are particularly vulnerable. The ability to escalate privileges locally may also facilitate lateral movement within networks, increasing the attack surface. Given the high CVSS score and the potential for full system compromise, the impact on confidentiality, integrity, and availability is severe. Organizations that do not restrict local user permissions or monitor installation processes are at higher risk. The lack of known exploits in the wild suggests a window of opportunity for proactive defense before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately restrict local user permissions to prevent unauthorized file modifications during software installations. 2. Implement application whitelisting and integrity monitoring to detect unauthorized DLL replacements during installation. 3. Use Windows Group Policy to limit which users can install or update software, especially from the Microsoft Store. 4. Monitor installation directories and temporary folders for suspicious file changes or DLL replacements. 5. Educate users about the risks of installing software from untrusted sources or without proper privileges. 6. Coordinate with Epic Games for timely patch deployment once available; prioritize patching affected versions. 7. Employ endpoint detection and response (EDR) solutions to identify anomalous privilege escalation attempts. 8. Consider isolating gaming environments or using virtual machines to limit the impact of potential exploits. 9. Regularly audit local accounts and remove unnecessary privileges to reduce the attack surface. 10. Maintain up-to-date backups to recover from potential compromise resulting from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-10-08T15:59:25.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696908b94c611209ad2ef133

Added to database: 1/15/2026, 3:33:13 PM

Last enriched: 1/15/2026, 3:47:44 PM

Last updated: 1/15/2026, 7:37:08 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats