CVE-2021-32238

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Rocket League allows attackers to execute arbitrary code or cause denial of service by crafting malicious UPK object files. This affects Rocket League players running version 1.95 or earlier. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Epic Games / Psyonix Rocket League
Versions: <=1.95
Operating Systems: Windows, macOS, Linux, PlayStation, Xbox, Nintendo Switch
Default Config Vulnerable: ⚠️ Yes
Notes: All platforms running vulnerable versions are affected. UPK files are game asset files that can be loaded during gameplay.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, and installation of persistent malware.

🟠

Likely Case

Game crashes causing denial of service, potentially with limited code execution in game context.

🟢

If Mitigated

Game crashes without code execution if exploit fails or protections are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious UPK files that get loaded by the game. Public proof-of-concept exists in vulnerability databases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.95

Vendor Advisory: https://www.epicgames.com/rocketleague/en/news

Restart Required: Yes

Instructions:

1. Launch Rocket League through Epic Games Launcher. 2. Allow automatic updates to complete. 3. Verify game version is >1.95. 4. Restart the game if prompted.

🔧 Temporary Workarounds

Disable custom content loading

all

Prevent loading of custom UPK files that could be malicious

Network segmentation

all

Isolate gaming systems from critical network segments

🧯 If You Can't Patch

  • Disable Rocket League until patched
  • Implement application whitelisting to prevent execution of malicious payloads

🔍 How to Verify

Check if Vulnerable:

Check Rocket League version in game settings or Epic Games Launcher. If version is 1.95 or lower, system is vulnerable.

Check Version:

In Rocket League: Settings → Gameplay → Version Number

Verify Fix Applied:

Verify game version is >1.95 in game settings or Epic Games Launcher.

📡 Detection & Monitoring

Log Indicators:

  • Game crash logs with memory access violations
  • Unexpected UPK file loading events
  • Process creation from Rocket League executable

Network Indicators:

  • Downloads of UPK files from untrusted sources
  • Network traffic to Rocket League servers with malformed requests

SIEM Query:

Process:Name='RocketLeague.exe' AND (EventID=1000 OR EventID=1001) AND Message CONTAINS 'ACCESS_VIOLATION'

🔗 References

📤 Share & Export