CVE-2025-61973: CWE-284: Improper Access Control in Epic Games Epic Games Store
A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
AI Analysis
Technical Summary
CVE-2025-61973 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Epic Games Store version 14.6.2.0 during its installation process via the Microsoft Store on Windows platforms. The flaw arises because the installer does not adequately restrict access to a DLL file that is loaded during installation, allowing a low-privilege user to replace this DLL with a malicious one. This DLL hijacking leads to local privilege escalation, enabling the attacker to execute code with elevated privileges, potentially SYSTEM level. The vulnerability does not require user interaction beyond initiating the installation and can be exploited by any user with low privileges on the system. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can gain control over the system, manipulate sensitive data, or disrupt system operations. While no public exploits are known yet, the vulnerability's nature and the widespread use of Epic Games Store make it a critical concern. The vulnerability was reserved in October 2025 and published in January 2026, with no patches currently listed, indicating that mitigation relies on vendor updates and local security controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Epic Games Store is installed on shared or multi-user Windows systems. An attacker with low privileges could escalate to administrative rights, compromising system security, stealing sensitive data, or deploying malware. This could lead to operational disruptions, data breaches, and loss of trust. Gaming companies, educational institutions, and enterprises with gaming on employee devices are particularly vulnerable. The ability to escalate privileges locally may also facilitate lateral movement within networks, increasing the attack surface. Given the high CVSS score and the potential for full system compromise, the impact on confidentiality, integrity, and availability is severe. Organizations that do not restrict local user permissions or monitor installation processes are at higher risk. The lack of known exploits in the wild suggests a window of opportunity for proactive defense before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately restrict local user permissions to prevent unauthorized file modifications during software installations. 2. Implement application whitelisting and integrity monitoring to detect unauthorized DLL replacements during installation. 3. Use Windows Group Policy to limit which users can install or update software, especially from the Microsoft Store. 4. Monitor installation directories and temporary folders for suspicious file changes or DLL replacements. 5. Educate users about the risks of installing software from untrusted sources or without proper privileges. 6. Coordinate with Epic Games for timely patch deployment once available; prioritize patching affected versions. 7. Employ endpoint detection and response (EDR) solutions to identify anomalous privilege escalation attempts. 8. Consider isolating gaming environments or using virtual machines to limit the impact of potential exploits. 9. Regularly audit local accounts and remove unnecessary privileges to reduce the attack surface. 10. Maintain up-to-date backups to recover from potential compromise resulting from exploitation.
Affected Countries
Germany, United Kingdom, France, Poland, Netherlands, Sweden, Italy, Spain
CVE-2025-61973: CWE-284: Improper Access Control in Epic Games Epic Games Store
Description
A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
AI-Powered Analysis
Technical Analysis
CVE-2025-61973 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Epic Games Store version 14.6.2.0 during its installation process via the Microsoft Store on Windows platforms. The flaw arises because the installer does not adequately restrict access to a DLL file that is loaded during installation, allowing a low-privilege user to replace this DLL with a malicious one. This DLL hijacking leads to local privilege escalation, enabling the attacker to execute code with elevated privileges, potentially SYSTEM level. The vulnerability does not require user interaction beyond initiating the installation and can be exploited by any user with low privileges on the system. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can gain control over the system, manipulate sensitive data, or disrupt system operations. While no public exploits are known yet, the vulnerability's nature and the widespread use of Epic Games Store make it a critical concern. The vulnerability was reserved in October 2025 and published in January 2026, with no patches currently listed, indicating that mitigation relies on vendor updates and local security controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Epic Games Store is installed on shared or multi-user Windows systems. An attacker with low privileges could escalate to administrative rights, compromising system security, stealing sensitive data, or deploying malware. This could lead to operational disruptions, data breaches, and loss of trust. Gaming companies, educational institutions, and enterprises with gaming on employee devices are particularly vulnerable. The ability to escalate privileges locally may also facilitate lateral movement within networks, increasing the attack surface. Given the high CVSS score and the potential for full system compromise, the impact on confidentiality, integrity, and availability is severe. Organizations that do not restrict local user permissions or monitor installation processes are at higher risk. The lack of known exploits in the wild suggests a window of opportunity for proactive defense before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately restrict local user permissions to prevent unauthorized file modifications during software installations. 2. Implement application whitelisting and integrity monitoring to detect unauthorized DLL replacements during installation. 3. Use Windows Group Policy to limit which users can install or update software, especially from the Microsoft Store. 4. Monitor installation directories and temporary folders for suspicious file changes or DLL replacements. 5. Educate users about the risks of installing software from untrusted sources or without proper privileges. 6. Coordinate with Epic Games for timely patch deployment once available; prioritize patching affected versions. 7. Employ endpoint detection and response (EDR) solutions to identify anomalous privilege escalation attempts. 8. Consider isolating gaming environments or using virtual machines to limit the impact of potential exploits. 9. Regularly audit local accounts and remove unnecessary privileges to reduce the attack surface. 10. Maintain up-to-date backups to recover from potential compromise resulting from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-10-08T15:59:25.342Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696908b94c611209ad2ef133
Added to database: 1/15/2026, 3:33:13 PM
Last enriched: 1/15/2026, 3:47:44 PM
Last updated: 1/15/2026, 7:37:08 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22803: CWE-789: Memory Allocation with Excessive Size Value in sveltejs kit
HighCVE-2026-0227: CWE-754 Improper Check for Unusual or Exceptional Conditions in Palo Alto Networks Cloud NGFW
MediumCVE-2026-22774: CWE-405: Asymmetric Resource Consumption (Amplification) in sveltejs devalue
HighCVE-2026-22775: CWE-405: Asymmetric Resource Consumption (Amplification) in sveltejs devalue
HighCVE-2025-70303: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.