CVE-2025-27997
📋 TL;DR
This vulnerability in Blizzard Battle.net allows attackers to escalate privileges by placing a malicious script or executable in the C:\ProgramData directory. Attackers could gain elevated system access by exploiting improper permissions. All users running the vulnerable version on Windows are affected.
💻 Affected Systems
- Blizzard Battle.net
📦 What is this software?
Battle.net by Blizzard
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and complete control over the affected system.
Likely Case
Local privilege escalation leading to unauthorized software installation, system configuration changes, and lateral movement within the network.
If Mitigated
Limited impact with proper file system permissions and user account controls preventing unauthorized write access to ProgramData.
🎯 Exploit Status
Exploit involves placing crafted files in specific directory. Requires some level of initial access to the system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Monitor Blizzard's official channels for security updates. Check for newer Battle.net versions and apply when available.
🔧 Temporary Workarounds
Restrict ProgramData Directory Permissions
windowsModify NTFS permissions on C:\ProgramData to prevent unauthorized write access
icacls "C:\ProgramData" /deny Users:(OI)(CI)W
icacls "C:\ProgramData" /deny Authenticated Users:(OI)(CI)W
Enable Controlled Folder Access
windowsUse Windows Defender's Controlled Folder Access to protect critical directories
Set-MpPreference -EnableControlledFolderAccess Enabled
🧯 If You Can't Patch
- Implement strict file system permissions on C:\ProgramData directory
- Use application whitelisting to prevent execution of unauthorized scripts/executables
🔍 How to Verify
Check if Vulnerable:
Check Battle.net version in application settings or via 'Battle.net.exe --version' command. Verify if version is 2.40.0.15267.
Check Version:
"C:\Program Files (x86)\Battle.net\Battle.net.exe" --version
Verify Fix Applied:
Update to a newer version than 2.40.0.15267 and verify permissions on C:\ProgramData directory.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file creation in C:\ProgramData directory
- Battle.net process spawning unexpected child processes
- Privilege escalation events in Windows Security logs
Network Indicators:
- Unusual outbound connections from Battle.net process
- Command and control traffic following privilege escalation
SIEM Query:
EventID=4688 AND ProcessName LIKE '%Battle.net%' AND NewProcessName NOT IN ('expected_processes')