CVE-2025-61973: CWE-284: Improper Access Control in Epic Games Epic Games Store
A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
AI Analysis
Technical Summary
CVE-2025-61973 is a local privilege escalation vulnerability identified in Epic Games Store version 14.6.2.0, specifically during its installation process via the Microsoft Store on Windows platforms. The root cause is improper access control (CWE-284) that allows a low-privilege user to replace a Dynamic Link Library (DLL) file during installation. This DLL hijacking attack vector enables the attacker to execute arbitrary code with elevated privileges, potentially system or administrator level, without requiring user interaction. The vulnerability is classified with a CVSS v3.1 score of 8.8, reflecting high impact on confidentiality, integrity, and availability, and low attack complexity. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. Although no exploits have been observed in the wild yet, the vulnerability presents a significant risk due to the common presence of Epic Games Store on gaming and multimedia systems worldwide. The installation process's insufficient validation and access control on DLL files during setup is the critical failure point. This flaw could be leveraged by malicious local users or malware to gain persistent elevated access, potentially leading to system compromise, data theft, or disruption of services. The vulnerability highlights the need for secure installation procedures and strict file system permissions during software deployment.
Potential Impact
The vulnerability allows a low-privilege user to escalate their privileges to higher levels, potentially system or administrator rights, which can lead to full system compromise. This impacts confidentiality by enabling unauthorized access to sensitive data, integrity by allowing modification or replacement of critical system files, and availability by potentially disrupting system or application operations. Organizations with shared or multi-user Windows environments where Epic Games Store is installed are particularly vulnerable. Attackers could leverage this flaw to install persistent malware, exfiltrate data, or disrupt gaming and related services. The high CVSS score reflects the severe consequences if exploited, especially in enterprise or gaming café environments where multiple users share systems. Although no known exploits exist currently, the vulnerability's nature and ease of exploitation make it a prime target for attackers once exploit code becomes available. The scope change indicates that the impact extends beyond the installation process, potentially affecting the entire system security posture.
Mitigation Recommendations
1. Restrict installation permissions: Ensure only trusted administrators can install or update Epic Games Store to prevent unauthorized DLL replacement. 2. Implement strict file system ACLs on installation directories and temporary folders used during installation to prevent low-privilege users from modifying DLL files. 3. Monitor file integrity during installation using endpoint detection and response (EDR) tools to detect unauthorized DLL changes. 4. Employ application whitelisting to prevent execution of unauthorized DLLs or binaries. 5. Use Windows Defender Application Control (WDAC) or similar technologies to enforce code integrity policies. 6. Educate users and administrators about the risks of local privilege escalation and the importance of secure installation practices. 7. Apply patches or updates from Epic Games promptly once available. 8. Consider deploying installation in isolated or controlled environments where possible. 9. Audit and limit local user privileges to the minimum necessary to reduce attack surface. 10. Use security tools to detect suspicious DLL hijacking or replacement activities during installation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, South Korea, Japan, Brazil, Russia, China, India
CVE-2025-61973: CWE-284: Improper Access Control in Epic Games Epic Games Store
Description
A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-61973 is a local privilege escalation vulnerability identified in Epic Games Store version 14.6.2.0, specifically during its installation process via the Microsoft Store on Windows platforms. The root cause is improper access control (CWE-284) that allows a low-privilege user to replace a Dynamic Link Library (DLL) file during installation. This DLL hijacking attack vector enables the attacker to execute arbitrary code with elevated privileges, potentially system or administrator level, without requiring user interaction. The vulnerability is classified with a CVSS v3.1 score of 8.8, reflecting high impact on confidentiality, integrity, and availability, and low attack complexity. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. Although no exploits have been observed in the wild yet, the vulnerability presents a significant risk due to the common presence of Epic Games Store on gaming and multimedia systems worldwide. The installation process's insufficient validation and access control on DLL files during setup is the critical failure point. This flaw could be leveraged by malicious local users or malware to gain persistent elevated access, potentially leading to system compromise, data theft, or disruption of services. The vulnerability highlights the need for secure installation procedures and strict file system permissions during software deployment.
Potential Impact
The vulnerability allows a low-privilege user to escalate their privileges to higher levels, potentially system or administrator rights, which can lead to full system compromise. This impacts confidentiality by enabling unauthorized access to sensitive data, integrity by allowing modification or replacement of critical system files, and availability by potentially disrupting system or application operations. Organizations with shared or multi-user Windows environments where Epic Games Store is installed are particularly vulnerable. Attackers could leverage this flaw to install persistent malware, exfiltrate data, or disrupt gaming and related services. The high CVSS score reflects the severe consequences if exploited, especially in enterprise or gaming café environments where multiple users share systems. Although no known exploits exist currently, the vulnerability's nature and ease of exploitation make it a prime target for attackers once exploit code becomes available. The scope change indicates that the impact extends beyond the installation process, potentially affecting the entire system security posture.
Mitigation Recommendations
1. Restrict installation permissions: Ensure only trusted administrators can install or update Epic Games Store to prevent unauthorized DLL replacement. 2. Implement strict file system ACLs on installation directories and temporary folders used during installation to prevent low-privilege users from modifying DLL files. 3. Monitor file integrity during installation using endpoint detection and response (EDR) tools to detect unauthorized DLL changes. 4. Employ application whitelisting to prevent execution of unauthorized DLLs or binaries. 5. Use Windows Defender Application Control (WDAC) or similar technologies to enforce code integrity policies. 6. Educate users and administrators about the risks of local privilege escalation and the importance of secure installation practices. 7. Apply patches or updates from Epic Games promptly once available. 8. Consider deploying installation in isolated or controlled environments where possible. 9. Audit and limit local user privileges to the minimum necessary to reduce attack surface. 10. Use security tools to detect suspicious DLL hijacking or replacement activities during installation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-10-08T15:59:25.342Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696908b94c611209ad2ef133
Added to database: 1/15/2026, 3:33:13 PM
Last enriched: 2/27/2026, 7:32:41 AM
Last updated: 3/24/2026, 10:54:00 AM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.