Steam and Microsoft warn of Unity flaw exposing gamers to attacks

October 6, 2025

Steam and Microsoft warn of Unity flaw exposing gamers to attacks

A code execution vulnerability in the Unity game engine could be exploited to achieve code execution on Android and privilege escalation on Windows.

Unity is a cross-platform game engine and development platform that provides rendering, physics, animation, and scripting tools for developers to create titles for Windows, macOS, Android, iOS, consoles, and the web.

A large number of mobile games are built with Unity, as well as indie and mid-tier PC/console titles. The platform is also used in non-gaming industries for real-time 3D applications.

Valve and Microsoft warn users

In response to the risk, Steam has taken action by releasing a new Client update that blocks the launching of custom URI schemes to prevent exploitation through its distribution platform.

At the same time, Valve recommends that publishers rebuild their games using a safe Unity version, or plug a patched version of the ‘UnityPlayer.dll’ file right into their existing builds.

Microsoft has also published a bulletin to warn about the issue, recommending users to uninstall vulnerable games until new versions that address CVE-2025-59489 become available.

The company said that popular game titles are vulnerable, including Hearthstone, The Elder Scrolls: Blades, Fallout Shelter, DOOM (2019), Wasteland 3, and Forza Customs.

Unity recommends developers to update the editor to the latest version branch and then recompile and redeploy their games or applications.

Patch extended to some unsupported versions

The vulnerability is tracked as CVE-2025-59489 and affects the Runtime component. It allows unsafe file loading and local file inclusion, and could lead to code execution and information disclosure.

GMO Flatt Security’s researcher ‘RyotaK’ discovered the vulnerability in May, at the Meta Bug Bounty Researcher Conference and says that it affects all games built on versions of the engine starting 2017.1.

“[The vulnerability] could allow local code execution and access to confidential information on end user devices running unity-built applications,”  Unity warns in its security bulletin.

“Code execution would be confined to the privilege level of the vulnerable application, and information disclosure would be confined to the information available to the vulnerable application.”

In a technical writeup, RyotaK showed that Unity’s handling of Android Intents allows any malicious app installed on the same device as the vulnerable game to load and execute an attacker-supplied native library.

This enables the attacker to achieve arbitrary code execution with the target game’s privileges.

While Ryotak discovered the issue on Android, the root cause – Unity’s handling of the -xrsdk-pre-init-library command line argument without proper validation or sanitization, is also present on Windows, macOS, and Linux operating platforms.

There are different input paths on these systems that can feed untrusted arguments or modify library search paths on the targeted application, so when conditions are met, exploitation is possible.

Unity states that it has observed no active exploitation as of the publication of its bulletin on October 2nd.

Fixes are available and the remediation steps include updating “the Unity Editor to the newest version then rebuild and redeploy the application” and replacing the Unity runtime binary with a patched version.

Unity has released fixes to out-of-support versions starting 2019.1 and later. Older versions that are no longer supported will not receive the patch.

Picus BAS Summit

The Security Validation Event of the Year: The Picus BAS Summit

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don’t miss the event that will shape the future of your security strategy

Original article can be found here