CVE-2025-0567
📋 TL;DR
This vulnerability in Epic Games Launcher involves an untrusted search path issue in the profapi.dll library during installation. Attackers could potentially load malicious DLLs from untrusted directories, but exploitation requires local access and is difficult. Only users running Epic Games Launcher versions up to 17.2.1 are affected.
💻 Affected Systems
- Epic Games Launcher
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could execute arbitrary code with the privileges of the user running the Epic Games Launcher installer, potentially leading to system compromise.
Likely Case
Limited impact due to high exploitation complexity and local access requirement; most likely scenario is failed exploitation attempts or minimal privilege escalation.
If Mitigated
With proper controls like limited user privileges and application whitelisting, impact would be minimal even if exploitation were attempted.
🎯 Exploit Status
Exploitation requires local access, manipulation of DLL search paths, and is described as difficult in the vulnerability description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 17.2.1
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Open Epic Games Launcher
2. Click on your profile icon
3. Select 'Settings'
4. Enable 'Auto-update' or manually check for updates
5. Restart the launcher after update completes
🔧 Temporary Workarounds
Restrict DLL search paths
windowsConfigure Windows to restrict DLL search paths using group policy or registry settings
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "SafeDllSearchMode" /t REG_DWORD /d 1 /f
Run with limited privileges
windowsEnsure Epic Games Launcher runs with standard user privileges rather than administrative rights
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized DLL loading
- Use endpoint detection and response (EDR) tools to monitor for DLL hijacking attempts
🔍 How to Verify
Check if Vulnerable:
Check Epic Games Launcher version in Settings > About or via Control Panel > Programs and Features
Check Version:
wmic product where "name like 'Epic Games Launcher%'" get version
Verify Fix Applied:
Verify version is greater than 17.2.1 and check that profapi.dll is properly loaded from trusted system directories
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing DLL loading from unusual paths
- Process Monitor logs showing profapi.dll being loaded from non-system directories
Network Indicators:
- No network indicators as this is a local vulnerability
SIEM Query:
EventID=7 OR EventID=11 AND (ProcessName="EpicGamesLauncher.exe" OR DLLName="profapi.dll") AND DLLPath NOT CONTAINS "C:\Windows\System32"