CVE-2025-9136
📋 TL;DR
CVE-2025-9136 is an out-of-bounds read vulnerability in RetroArch's filestream_vscanf function that could allow local attackers to read sensitive memory contents. This affects RetroArch versions 1.18.0 through 1.20.0. The vulnerability requires local access to exploit, limiting its attack surface.
💻 Affected Systems
- RetroArch
📦 What is this software?
Retroarch by Libretro
Retroarch by Libretro
Retroarch by Libretro
⚠️ Risk & Real-World Impact
Worst Case
Local attacker could read sensitive memory contents, potentially exposing credentials, encryption keys, or other application data, leading to privilege escalation or further system compromise.
Likely Case
Information disclosure of application memory, potentially revealing configuration data or limited system information to local users.
If Mitigated
Minimal impact with proper access controls and user separation, as the vulnerability requires local execution.
🎯 Exploit Status
Exploitation requires local access and specific conditions to trigger the out-of-bounds read. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.21.0
Vendor Advisory: https://github.com/libretro/RetroArch/releases/tag/v1.21.0
Restart Required: No
Instructions:
1. Download RetroArch 1.21.0 from official sources. 2. Replace existing RetroArch installation with the new version. 3. Verify the update was successful by checking the version.
🔧 Temporary Workarounds
Restrict local access
allLimit local user access to RetroArch installations to trusted users only
🧯 If You Can't Patch
- Restrict RetroArch execution to trusted users only using file permissions and access controls
- Isolate RetroArch installations in sandboxed environments or containers
🔍 How to Verify
Check if Vulnerable:
Check RetroArch version by running 'retroarch --version' or checking the About section in the GUI
Check Version:
retroarch --version
Verify Fix Applied:
Verify version is 1.21.0 or higher using 'retroarch --version' command
📡 Detection & Monitoring
Log Indicators:
- Unusual memory access patterns in application logs
- Segmentation faults or memory access violations
Network Indicators:
- No network indicators as this is a local vulnerability
SIEM Query:
Application logs containing 'segmentation fault', 'memory violation', or 'out of bounds' related to RetroArch processes
🔗 References
- https://github.com/libretro/RetroArch/pull/17555
- https://github.com/libretro/RetroArch/pull/17555#issuecomment-2651403849
- https://github.com/libretro/RetroArch/pull/17555/commits/6446f045ec7fc6a5cac3e8ec35a2f0a5889c88e8
- https://github.com/libretro/RetroArch/releases/tag/v1.21.0
- https://vuldb.com/?ctiid.320516
- https://vuldb.com/?id.320516
- https://vuldb.com/?submit.617657
- https://vuldb.com/?submit.617657