CVE-2024-54756

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical remote code execution vulnerability in GZDoom v4.13.1. Attackers can exploit it by tricking users into opening a malicious PK3 file containing specially crafted ZScript code, allowing arbitrary command execution on the victim's system. This affects all users running the vulnerable version of GZDoom.

💻 Affected Systems

Products:
  • GZDoom
Versions: v4.13.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability is triggered when loading PK3 files containing ZScript.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation or malware installation on the user's system when opening malicious game mods or content from untrusted sources.

🟢

If Mitigated

Limited impact if users only open trusted PK3 files from verified sources and have proper endpoint protection.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available. Exploitation requires user interaction to open malicious PK3 files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.13.2 or later

Vendor Advisory: https://github.com/coelckers/gzdoom/releases

Restart Required: Yes

Instructions:

1. Download latest GZDoom version from official GitHub releases. 2. Replace existing installation with updated version. 3. Restart system to ensure clean state.

🔧 Temporary Workarounds

Disable ZScript Loading

all

Prevent GZDoom from loading ZScript files which mitigates the vulnerability

Set 'zscript' to 0 in gzdoom.ini configuration file

Restrict PK3 File Sources

all

Only load PK3 files from trusted, verified sources

🧯 If You Can't Patch

  • Discontinue use of GZDoom until patched version is available
  • Implement application whitelisting to prevent execution of GZDoom

🔍 How to Verify

Check if Vulnerable:

Check GZDoom version via Help → About menu or command 'gzdoom --version'

Check Version:

gzdoom --version

Verify Fix Applied:

Verify version is 4.13.2 or higher and test loading known safe PK3 files

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from GZDoom executable
  • Failed ZScript compilation attempts
  • Loading of PK3 files from unusual locations

Network Indicators:

  • Downloads of PK3 files from untrusted sources
  • Outbound connections from GZDoom process to suspicious IPs

SIEM Query:

Process Creation where Parent Process contains 'gzdoom' AND Command Line contains unusual parameters

🔗 References

📤 Share & Export