CVE-2025-10198
📋 TL;DR
Sunshine for Windows v2025.122.141614 has a DLL search-order hijacking vulnerability where attackers can place malicious DLLs in user-writable PATH directories. When Sunshine loads DLLs, it may execute attacker-controlled code instead of legitimate libraries. This affects all Windows users running the vulnerable version.
💻 Affected Systems
- Sunshine
📦 What is this software?
Sunshine by Lizardbyte
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, allowing complete control over the host, data theft, and lateral movement within the network.
Likely Case
Local privilege escalation to SYSTEM or administrator privileges, enabling persistence, credential theft, and installation of additional malware.
If Mitigated
Limited impact with proper application whitelisting and restricted user permissions, potentially only allowing code execution at the current user's privilege level.
🎯 Exploit Status
Requires local access to place malicious DLLs in PATH directories. No authentication bypass needed beyond local file system access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit 9db11a906167bd962e57896223d7b9718058aeb2
Vendor Advisory: https://github.com/LizardByte/Sunshine/commit/9db11a906167bd962e57896223d7b9718058aeb2
Restart Required: Yes
Instructions:
1. Update Sunshine to latest version. 2. Restart Sunshine service. 3. Verify version is newer than v2025.122.141614.
🔧 Temporary Workarounds
Restrict PATH directory permissions
windowsRemove write permissions for standard users from all directories in the PATH environment variable
icacls "C:\Windows\System32" /deny Users:(OI)(CI)W
icacls "C:\Windows" /deny Users:(OI)(CI)W
Use application whitelisting
windowsConfigure Windows Defender Application Control or AppLocker to block unauthorized DLL loading
🧯 If You Can't Patch
- Remove write permissions from PATH directories for standard users
- Monitor for suspicious DLL creation in PATH directories using file integrity monitoring
🔍 How to Verify
Check if Vulnerable:
Check Sunshine version in About section or run 'sunshine --version' in command line
Check Version:
sunshine --version
Verify Fix Applied:
Verify version is newer than v2025.122.141614 and check commit hash includes 9db11a906167bd962e57896223d7b9718058aeb2
📡 Detection & Monitoring
Log Indicators:
- Unexpected DLL loads from non-standard locations
- Sunshine process loading DLLs from user-writable directories
Network Indicators:
- Unusual outbound connections from Sunshine process after DLL load
SIEM Query:
process_name:"sunshine.exe" AND file_path:"*\Users\*\*.dll" OR file_path:"*\AppData\*\*.dll"