# N/A
## 概述
Epic Games Store 通过 Microsoft Store 安装过程中存在本地提权漏洞。
## 影响版本
通过 Microsoft Store 安装的 Epic Games Store 版本。
## 细节
低权限用户可在安装过程中替换 DLL 文件,利用该漏洞在权限提升的上下文中加载恶意 DLL。
## 影响
攻击者可借此实现本地特权提升,以更高权限执行代码。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: TALOS-2025-2279 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence -- 🔗来源链接
标签:
神龙速读:
- **CVE Number**: CVE-2025-61973
- **Title**: Epic Games Store Installation DLL Hijacking Privilege Escalation Vulnerability
- **Summary**: A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
- **Affected Versions**: Epic Games Store 14.6.2.0
- **CVSS Score**: 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
- **CWE**: CWE-284 - Improper Access Control
- **Details**:
- When Epic Games Store is installed via the Microsoft Store application, a vulnerable process involves `WindowsPackageManagerServer.exe`, `msiexec.exe`, and `DXSETUP.exe`.
- The vulnerability arises because a `tmp` folder is writable by standard users, allowing an attacker to replace `dxupdate.dll` with a malicious DLL.
- When `DXSETUP.exe` loads the malformed `dxupdate.dll`, it executes with SYSTEM privileges.
- **Timeline**:
- 2025-10-14: Initial Vendor Contact & Vendor Disclosure
- 2025-11-06: Vendor Patch Release
- 2026-01-15: Public Release
- **Credit**: Discovered by KPC of Cisco Talos.
暂无评论