CVE-2021-32075
📋 TL;DR
CVE-2021-32075 is an insecure deserialization vulnerability in Re-Logic Terraria game client that allows remote code execution. Attackers can exploit this by sending maliciously crafted data to vulnerable clients, potentially taking full control of affected systems. All Terraria players using vulnerable versions are affected.
💻 Affected Systems
- Re-Logic Terraria
📦 What is this software?
Terraria by Re Logic
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the victim's computer, allowing data theft, ransomware deployment, or use as a botnet node.
Likely Case
Remote code execution leading to malware installation, credential theft, or system disruption for gaming sessions.
If Mitigated
Limited impact if network controls prevent malicious connections, but still vulnerable to attacks from within trusted networks.
🎯 Exploit Status
Exploitation requires sending malicious data to vulnerable client, which can be done through multiplayer connections or crafted game data.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.2.3
Vendor Advisory: https://store.steampowered.com/news/app/105600/view/3062989030626131236
Restart Required: Yes
Instructions:
1. Open Steam client. 2. Navigate to Terraria in your library. 3. Ensure automatic updates are enabled or manually check for updates. 4. Install Terraria version 1.4.2.3 or later. 5. Restart the game.
🔧 Temporary Workarounds
Disable Multiplayer
allPrevent exploitation by disabling multiplayer connections
Not applicable - configure in game settings
Network Segmentation
allRestrict Terraria traffic to trusted networks only
Configure firewall to block Terraria ports (default 7777) from untrusted networks
🧯 If You Can't Patch
- Disable multiplayer functionality completely
- Use network-level controls to restrict Terraria traffic to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check Terraria version in game main menu or Steam library. If version is below 1.4.2.3, system is vulnerable.
Check Version:
In Terraria: Check version on main menu. In Steam: Right-click Terraria → Properties → Updates → check version.
Verify Fix Applied:
Confirm Terraria version is 1.4.2.3 or higher in game main menu or Steam properties.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Terraria executable
- Network connections to suspicious IPs on Terraria ports
Network Indicators:
- Unusual traffic patterns on Terraria default port 7777
- Malformed packet data to Terraria clients
SIEM Query:
Process Creation where ParentImage contains 'terraria.exe' AND NOT (CommandLine contains expected game parameters)
🔗 References
- https://store.steampowered.com/news/app/105600/view/3062989030626131236
- https://terraria.fandom.com/wiki/1.4.2.3
- https://twitter.com/relogicgames
- https://vuln.ryotak.me/advisories/42
- https://store.steampowered.com/news/app/105600/view/3062989030626131236
- https://terraria.fandom.com/wiki/1.4.2.3
- https://twitter.com/relogicgames
- https://vuln.ryotak.me/advisories/42