A code execution vulnerability within the Unity sport engine may very well be exploited to realize code execution on Android and privilege escalation on Home windows.
Unity is a cross-platform sport engine and improvement platform that gives rendering, physics, animation, and scripting instruments for builders to create titles for Home windows, macOS, Android, iOS, consoles, and the net.
Numerous cell video games are constructed with Unity, in addition to indie and mid-tier PC/console titles. The platform can also be utilized in non-gaming industries for real-time 3D functions.
Valve and Microsoft warn customers
In response to the chance, Steam has taken motion by releasing a brand new Consumer replace that blocks the launching of customized URI schemes to forestall exploitation via its distribution platform.
On the similar time, Valve recommends that publishers rebuild their video games utilizing a secure Unity model, or plug a patched model of the ‘UnityPlayer.dll’ file proper into their present builds.
Microsoft has additionally revealed a bulletin to warn in regards to the situation, recommending customers to uninstall weak video games till new variations that handle CVE-2025-59489 turn out to be accessible.
The corporate stated that in style sport titles are weak, together with Hearthstone, The Elder Scrolls: Blades, Fallout Shelter, DOOM (2019), Wasteland 3, and Forza Customs.
Unity recommends builders to replace the editor to the most recent model department after which recompile and redeploy their video games or functions.
Patch prolonged to some unsupported variations
The vulnerability is tracked as CVE-2025-59489 and impacts the Runtime element. It permits unsafe file loading and native file inclusion, and will result in code execution and data disclosure.
GMO Flatt Safety’s researcher ‘RyotaK’ found the vulnerability in Might, at the Meta Bug Bounty Researcher Convention and says that it impacts all video games constructed on variations of the engine beginning 2017.1.
“[The vulnerability] might enable native code execution and entry to confidential data on finish person units working unity-built functions,” Unity warns in its security bulletin.
“Code execution can be confined to the privilege stage of the weak software, and data disclosure can be confined to the knowledge accessible to the weak software.”
In a technical writeup, RyotaK confirmed that Unity’s dealing with of Android Intents permits any malicious app put in on the identical system because the weak sport to load and execute an attacker-supplied native library.
This permits the attacker to realize arbitrary code execution with the goal sport’s privileges.
Whereas Ryotak found the difficulty on Android, the foundation trigger – Unity’s dealing with of the -xrsdk-pre-init-library command line argument with out correct validation or sanitization, can also be current on Home windows, macOS, and Linux working platforms.
There are totally different enter paths on these methods that may feed untrusted arguments or modify library search paths on the focused software, so when situations are met, exploitation is feasible.
Unity states that it has noticed no lively exploitation as of the publication of its bulletin on October 2nd.
Fixes can be found and the remediation steps embody updating “the Unity Editor to the latest model then rebuild and redeploy the appliance” and changing the Unity runtime binary with a patched model.
Unity has launched fixes to out-of-support variations beginning 2019.1 and later. Older variations which can be now not supported won’t obtain the patch.

Be part of the Breach and Attack Simulation Summit and expertise the way forward for security validation. Hear from prime consultants and see how AI-powered BAS is reworking breach and assault simulation.
Do not miss the occasion that can form the way forward for your security technique



