Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official blog

0
Medium
Vulnerability
Published: Tue Oct 07 2025 (10/07/2025, 08:56:20 UTC)
Source: Kaspersky Security Blog

Description

Exploring a dangerous vulnerability in the Unity game engine, and how to protect your devices

AI-Powered Analysis

AILast updated: 10/23/2025, 01:30:54 UTC

Technical Analysis

The CVE-2025-59489 vulnerability resides in the Unity game engine versions dating back to 2017.01, affecting all modern Unity games across multiple platforms including Android, Linux, macOS, and Windows. The flaw stems from the Unity Runtime's unsafe processing of certain startup parameters intended for debugging purposes, such as -xrsdk-pre-init-library, --dataFolder, overrideMonoSearchPath, and -monoProfiler. These parameters allow the engine to load arbitrary dynamic libraries (.dll, .so, .dylib) specified by an attacker. A malicious low-privilege application or a remote attacker exploiting URI schema handlers can launch a Unity game with these parameters, causing the game to load and execute malicious code with the same privileges as the game itself. This effectively bypasses OS-level sandboxing and security controls, enabling privilege escalation to a “respected user” level or higher depending on the game’s permissions. The vulnerability is particularly dangerous because games often require elevated privileges and are trusted by antivirus solutions, allowing malicious libraries to evade detection. Although no active exploitation has been observed, the vulnerability is easy to exploit and widely publicized, prompting Valve to block unsafe game launches on Steam and Microsoft to recommend uninstalling vulnerable games until patched. Developers must update the Unity Editor, recompile games with the patched runtime, and republish them. For unsupported games, Unity offers an Application Patcher that replaces vulnerable runtime libraries, primarily effective on Windows. Users should keep games updated and employ comprehensive endpoint protection to prevent exploitation. The vulnerability does not affect Xbox versions of games. This issue highlights the risks posed by third-party engines in software supply chains and the importance of timely patching and vendor cooperation.

Potential Impact

For European organizations, the CVE-2025-59489 vulnerability poses significant risks especially in sectors where gaming or Unity-based applications are prevalent, such as entertainment, education, and software development. Exploitation can lead to unauthorized code execution, privilege escalation, and potential lateral movement within corporate networks if gaming devices are connected to enterprise environments. The ability to load malicious libraries under the guise of trusted games can bypass traditional endpoint defenses, increasing the risk of data breaches, intellectual property theft, or disruption of business operations. Mobile devices running vulnerable Unity games are also at risk, potentially exposing sensitive personal or corporate data. The widespread use of Unity in Europe, combined with the popularity of platforms like Steam, increases the attack surface. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations by delivering malicious payloads through popular games. The impact is compounded by the difficulty in patching unsupported games and the need for user vigilance. Failure to address this vulnerability could result in reputational damage, regulatory penalties under GDPR if personal data is compromised, and increased incident response costs.

Mitigation Recommendations

1. Developers must urgently update to the latest Unity Editor version containing the patched runtime and recompile all affected games, then republish updates on all distribution platforms. 2. Users should promptly install updates for all Unity-based games and avoid running unpatched versions. 3. For unsupported or legacy games, use the Unity Application Patcher on Windows to replace vulnerable runtime libraries, understanding that this may not be feasible on macOS or Android. 4. Organizations should implement application whitelisting and restrict execution of games with suspicious startup parameters. 5. Endpoint detection and response (EDR) solutions should be tuned to detect unusual game launch parameters and loading of unexpected dynamic libraries. 6. Network controls should block or monitor URI schema handler invocations from untrusted browsers or websites to prevent remote exploitation. 7. Steam users should ensure their client is updated to benefit from Valve’s protective measures that block unsafe game launches. 8. Consider temporarily uninstalling vulnerable games on critical systems until patches are available. 9. Educate users about the risks of launching games from untrusted sources or clicking suspicious links that may trigger game launches with malicious parameters. 10. Maintain comprehensive cybersecurity solutions like Kaspersky Premium to detect and prevent first-stage malware and exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/update-unity-games-cve-2025-59489/54542/","fetched":true,"fetchedAt":"2025-10-07T09:03:53.281Z","wordCount":1283}

Threat ID: 68e4d779769a746382d0cc09

Added to database: 10/7/2025, 9:03:53 AM

Last enriched: 10/23/2025, 1:30:54 AM

Last updated: 11/22/2025, 2:01:22 AM

Views: 500

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats