// For flags

CVE-2020-7352

GOG Galaxy GalaxyClientService Privilege Escalation

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.

El componente GalaxyClientService de GOG Galaxy se ejecuta con privilegios SYSTEM elevados en un entorno Windows. Debido a que el software se entrega con clave privada RSA estática incorporada, un atacante con este material clave y permisos de usuario local puede enviar de forma efectiva cualquier comando del sistema operativo hacia el servicio para su ejecución en este contexto elevado. El servicio escucha dichos comandos en un puerto de red enlazado localmente, localhost: 9978. Se ha publicado un módulo Metasploit que explota esta vulnerabilidad. Este problema afecta a la rama 2.0.x del software (versión 2.0.12 y anteriores), así como a la rama 1.2.x (versión 1.2.64 y anteriores). Una corrección fue emitida para la rama 2.0.x del software afectado

*Credits: This issue was discovered and reported to Rapid7 by Joe Testa via the Metasploit Framework.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-21 CVE Reserved
  • 2020-06-15 CVE Published
  • 2022-01-11 First Exploit
  • 2024-04-04 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gog
Search vendor "Gog"
Galaxy
Search vendor "Gog" for product "Galaxy"
>= 1.2.0 <= 1.2.64
Search vendor "Gog" for product "Galaxy" and version " >= 1.2.0 <= 1.2.64"
windows
Affected
Gog
Search vendor "Gog"
Galaxy
Search vendor "Gog" for product "Galaxy"
>= 2.0.0 <= 2.0.12
Search vendor "Gog" for product "Galaxy" and version " >= 2.0.0 <= 2.0.12"
windows
Affected