Vulnerability Description
The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gog | Galaxy | >= 1.2.0, <= 1.2.64 |
Related Weaknesses (CWE)
References
- https://github.com/rapid7/metasploit-framework/pull/13444PatchThird Party Advisory
- https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privileExploitThird Party Advisory
- https://github.com/rapid7/metasploit-framework/pull/13444PatchThird Party Advisory
- https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privileExploitThird Party Advisory
FAQ
What is CVE-2020-7352?
CVE-2020-7352 is a vulnerability with a CVSS score of 8.4 (HIGH). The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this...
How severe is CVE-2020-7352?
CVE-2020-7352 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7352?
Check the references section above for vendor advisories and patch information. Affected products include: Gog Galaxy.