7.4 CVE-2025-59489

Enriched by CISA RCE Exploit
 

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
https://nvd.nist.gov/vuln/detail/CVE-2025-59489

Categories

CWE-88 : Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

CWE-426 : Untrusted Search Path

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Unity3D Unity Editor
  • 6000.3 < 6000.3.0b4 [affected]
  • 6000.2 < 6000.2.6f2 [affected]
  • 6000.0 LTS < 6000.0.58f2 [affected]
  • 2022.3 xLTS < 2022.3.67f2 [affected]
  • 2021.3 xLTS < 2021.3.56f2 [affected]
  • 6000.1 < 6000.1.17f1 [affected]
  • 2023.2 < 2023.2.22f1 [affected]
  • 2023.1 < 2023.1.22f1 [affected]
  • 2022.3 LTS < 2022.3.62f2 [affected]
  • 2022.2 < 2022.2.23f1 [affected]
  • 2022.1 < 2022.1.25f1 [affected]
  • 2021.3 LTS < 2021.3.45f2 [affected]
  • 2021.2 < 2021.2.20f1 [affected]
  • 2021.1 < 2021.1.29f1 [affected]
  • 2020.3 < 2020.3.49f1 [affected]
  • 2020.2 < 2020.2.8f1 [affected]
  • 2020.1 < 2020.1.18f1 [affected]
  • 2019.4 LTS < 2019.4.41f1 [affected]
  • 2019.3 < 2019.3.17f1 [affected]
  • 2019.2 < 2019.2.23f1 [affected]
  • 2017.1.2p4 < 2019.1.15f1 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
AND
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2017.4 <= 2018.4
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2019.1 < 2019.1.15f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2019.2 < 2019.2.23f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2019.3 <= 2019.3.17f1
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 2019.4 < 2019.4.41f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2020.1 < 2020.1.18f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2020.2 < 2020.2.8f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2020.3 < 2020.3.49f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2021.1 < 2021.1.29f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2021.2 < 2021.2.20f1
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 2021.3 < 2021.3.45f2
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2022.1 < 2022.1.25f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 2022.2 < 2022.2.23f1
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 2022.3 < 2022.3.62f2
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 2023.1 < 2023.1.22f1
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 2023.2 < 2023.2.22f1
   cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* >= 6000.0 < 6000.0.58f2
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 6000.1 < 6000.1.17f1
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 6000.2 < 6000.2.6f2
   cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* >= 6000.3 < 6000.3.0b4
   cpe:2.3:a:unity:editor:2017.1.2p4+:*:*:*:-:*:*:*
   cpe:2.3:a:unity:editor:2017.2.0p4+:*:*:*:-:*:*:*
   cpe:2.3:a:unity:editor:2017.3.0b9+:*:*:*:-:*:*:*
  Running on/with
  cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
  cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
  cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
  cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
137 Parameter Injection
Medium
174 Flash Parameter Injection
Medium
41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
High
460 HTTP Parameter Pollution (HPP)
Medium
88 OS Command Injection
High
38 Leveraging/Manipulating Configuration File Search Paths
Very High


MITRE


Techniques

id description
T1574.007 Hijack Execution Flow:Path Interception by PATH Environment Variable
T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.