The games that have been temporarily taken down are:
- Grounded 2 Founders Edition
- Grounded 2 Founders Pack
- Avowed Premium Edition
- Avowed Premium Edition Upgrade
- Pillars of Eternity: Hero Edition
- Pillars of Eternity: Definitive Edition
- Pillars of Eternity II: Deadfire
- Pillars of Eternity II: Deadfire Ultimate
- Pentiment
This feels unnecessary and overblown. From what I’ve heard, the exploit in question requires a local file and only operates at the privilege level of the game itself, so you’re unlikely to encounter it unless you’re adding files to your game install.
So you’re vulnerable if you install malicious mods, in other words. Which, consisting Unity mods are done via DLL injection, is already the case even without this exploit.
How many unity games have kernel level anti cheat as a requirement and can this exploit leverage that?
Oh probably at least some of them, though shouldn’t be a problem, after all, the
rootkitkernel level anti cheat is within the game directory and its standard privelege/permission model, and is only there for your safety.=D =D =D
Yeah, but if they didn’t do anything then they’d get roasted and maybe sued for negligence.
Exactly.
Unity literally issued a statement that every game that is affected by this should be patched with the fix ASAP… and this is people doing that.
Not like anyone ever runs a game with admin priveleges or anything, right?
Not like malware from some other source often exploits weird little shit like this that just nobody ever noticed before and thats why that malware stays hidden, right?
https://unity.com/security/sept-2025-01
“No evidence of exploitation” is not the same thing as “we are 100% sure no one has ever been harmed by/via this”.
https://cwe.mitre.org/data/definitions/426.html
Yeah sounds fairly serious to me, its an 8.4 out of 10 on the severity scale for a reason.
I would hope no one runs userspace software with elevated privileges.
… Have you ever met a computer user?