CVE-2022-27095

7.8 HIGH

📋 TL;DR

BattlEye anti-cheat software v0.9 contains an unquoted service path vulnerability that allows local attackers to escalate privileges to SYSTEM level by placing a malicious executable in a directory with a specific name. This affects systems running BattlEye v0.9 on Windows. Attackers need local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • BattlEye Anti-Cheat
Versions: v0.9
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems where BattlEye is installed as a service with an unquoted path. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege escalation leading to complete system compromise, persistence installation, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access protected system resources.

🟢

If Mitigated

Limited impact with proper access controls, but still presents a security risk that should be patched.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account on affected systems can escalate to SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. Public exploit code is available on Exploit-DB (50815). The vulnerability is straightforward to exploit once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.9.1 or later

Vendor Advisory: https://www.battleye.com/

Restart Required: Yes

Instructions:

1. Update BattlEye to version 0.9.1 or later. 2. Restart the system to ensure the updated service is running. 3. Verify the service path is properly quoted in the Windows service configuration.

🔧 Temporary Workarounds

Manually quote service path

windows

Manually edit the BattlEye service configuration to use quoted paths

sc config "BattlEye Service" binPath= "\"C:\Program Files\BattlEye\BEService.exe\""

Restrict directory permissions

windows

Set strict permissions on directories in the BattlEye installation path to prevent unauthorized file creation

icacls "C:\Program Files\BattlEye" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected systems
  • Monitor for suspicious file creation in BattlEye installation directories and service-related activities

🔍 How to Verify

Check if Vulnerable:

Check if BattlEye service path is unquoted: sc qc "BattlEye Service" | findstr BINARY_PATH_NAME

Check Version:

Check BattlEye version in Control Panel or via the service properties

Verify Fix Applied:

Verify service path is quoted and BattlEye version is 0.9.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing unexpected executables running from BattlEye directories
  • Windows Event ID 7045 (service installation) showing service path modifications

Network Indicators:

  • Unusual outbound connections from BattlEye service or related processes

SIEM Query:

EventID=4688 AND (ProcessName="*BattlEye*" OR Image="*BattlEye*") AND NOT (CommandLine="*\"C:\\Program Files\\BattlEye\\*\"*")

🔗 References

📤 Share & Export