by eugenekolo on 2/3/25, 6:02 PM with 129 comments
by doctorpangloss on 2/3/25, 6:58 PM
by agentultra on 2/3/25, 7:26 PM
Nice PoC!
Update: yes, most game client processes don't run in the kernel. My b. I was just thinking that updates and content payloads might be an interesting vector for langsec.
by kibwen on 2/3/25, 9:07 PM
Reminder that all three Dark Souls games allowed full RCE to any users connected to the internet: https://flashpoint.io/blog/rce-vulnerability-dark-souls/
by lockemx on 2/3/25, 9:14 PM
by bangaladore on 2/3/25, 6:27 PM
"sake of anti-cheat" should be taken lightly here. There is a reason why all the other sane anti-cheats have at least two applications, the anti cheat service which often runs as admin, and the game, which does not. Running the game as admin is quite frankly inexcusable.
The service often does the network comms and communicates to a kernel-mode driver and/or to the application via IPC or similar. Having defined barriers of separation are good things.
In any case, this POC doesn't have huge implications necessarily for most people, but maybe in SEA or China where LAN cafes are more prevalent, it could be a larger concern.
by sanktanglia on 2/3/25, 7:59 PM
by lcnPylGDnU4H9OF on 2/3/25, 10:19 PM
Does he mean that this is potentially how one could install custom firmware on their console?
Curious because I remember reading somewhat recently that console vendors have locked their consoles down well enough so as to avoid any vulnerabilities which could be exploited to install custom firmware. It would be amusing if that was invalidated by game dev security and I start hearing about ways to install some modded firmware, which include a step of "install one of these games".
IIRC, the web browser on 3DS systems was exploited to install custom firmware rather than a game so it was rather easily patched with a system update (and, indeed, it actually was patched). I wonder if we'll be seeing Sony/Nintendo/Microsoft start to insist on certain security standards as a result of games being exploited to install custom firmware on the devices they sell, presuming the answer to my first question is affirmative.
by tart-lemonade on 2/3/25, 10:18 PM
Just build a JSON API! It's not that hard! You don't need to RCE your game every time it launches just for microtransactions.
by S0y on 2/3/25, 7:19 PM
by jauntywundrkind on 2/3/25, 6:51 PM
It would have been a tiny bit funny if it had been the same company that was just briefly banned that was allowing a remote exploit.
by zxilly on 2/3/25, 9:27 PM
by plagiarist on 2/3/25, 9:35 PM
by foco_tubi on 2/3/25, 10:18 PM
by wyldfire on 2/3/25, 8:17 PM
by bilekas on 2/3/25, 9:10 PM
Because game developers are SUPPOSED to be aware of these things?
> It's very hard for security researchers to report bugs to most game dev companies. On top of that, most do not have bug bounty programs
Yet the OP blames the GAME developers…
They already have harder jobs than the majority of us, picking on them for not knowing skills outside of their area is just being mean and OP is targeting frustration at the wrong group.