CVE-2021-26807

7.8 HIGH

📋 TL;DR

CVE-2021-26807 is a DLL hijacking vulnerability in GOG Galaxy Client version 2.0.28.9 that loads unsigned DLLs from the PATH environment variable. This allows local attackers to execute arbitrary code by placing malicious DLLs in directories searched before the legitimate ones. Users of the affected GOG Galaxy Client version are vulnerable.

💻 Affected Systems

Products:
  • GOG Galaxy Client
Versions: 2.0.28.9 (specifically mentioned; potentially earlier versions with same behavior)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when Galaxy Client loads zlib1.dll, libgcc_s_dw2-1.dll, or libwinpthread-1.dll from PATH without signature verification.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with the privileges of the user running Galaxy Client, potentially leading to malware installation, data theft, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware execution if an attacker can place malicious DLLs in writable directories within the PATH search order.

🟢

If Mitigated

Limited impact if proper application whitelisting, DLL signing verification, or restricted user permissions are enforced.

🌐 Internet-Facing: LOW - This is a local attack vector requiring access to the target system's filesystem.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this for privilege escalation or persistence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to plant malicious DLLs in directories searched before legitimate ones. Public proof-of-concept demonstrates the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.35 or later

Vendor Advisory: https://www.gog.com

Restart Required: Yes

Instructions:

1. Open GOG Galaxy Client. 2. Go to Settings > General. 3. Check for updates and install version 2.0.35 or newer. 4. Restart the client.

🔧 Temporary Workarounds

Restrict PATH directory permissions

windows

Prevent unauthorized users from writing to directories in the PATH environment variable that are searched before the legitimate DLL locations.

Use Windows permissions to restrict write access to vulnerable PATH directories for standard users.

Use application whitelisting

windows

Configure Windows Defender Application Control or similar solutions to block execution of unsigned DLLs from untrusted locations.

🧯 If You Can't Patch

  • Remove write permissions for standard users to directories in PATH that are searched before legitimate DLL locations.
  • Monitor for suspicious DLL loading events using Windows Event Logs or EDR solutions.

🔍 How to Verify

Check if Vulnerable:

Check if GOG Galaxy Client version is 2.0.28.9 or earlier by opening the client and navigating to Settings > General to view version.

Check Version:

Not applicable via command line; check through Galaxy Client GUI at Settings > General.

Verify Fix Applied:

Confirm the client version is 2.0.35 or newer in Settings > General. Test by attempting to load a test DLL from PATH (requires controlled testing environment).

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs (Security/System) showing DLL loading from unexpected paths
  • EDR alerts for unsigned DLL loading by GalaxyClient.exe

Network Indicators:

  • None - this is a local file system attack

SIEM Query:

EventID=7 (Image loaded) from source GalaxyClient.exe where ImageLoaded contains 'zlib1.dll', 'libgcc_s_dw2-1.dll', or 'libwinpthread-1.dll' from non-standard paths

🔗 References

📤 Share & Export