8.4

CVE-2025-59489

Medienbericht
Exploit
Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
UnityEditor SwEdition- Version >= 2017.4 <= 2018.4
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2019.1 < 2019.1.15f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2019.2 < 2019.2.23f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2019.3 <= 2019.3.17f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 2019.4 < 2019.4.41f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2020.1 < 2020.1.18f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2020.2 < 2020.2.8f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2020.3 < 2020.3.49f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2021.1 < 2021.1.29f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2021.2 < 2021.2.20f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 2021.3 < 2021.3.45f2
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2022.1 < 2022.1.25f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 2022.2 < 2022.2.23f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 2022.3 < 2022.3.62f2
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 2023.1 < 2023.1.22f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 2023.2 < 2023.2.22f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEditionlts Version >= 6000.0 < 6000.0.58f2
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 6000.1 < 6000.1.17f1
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 6000.2 < 6000.2.6f2
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor SwEdition- Version >= 6000.3 < 6000.3.0b4
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor Version2017.1.2p4+ SwEdition-
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor Version2017.2.0p4+ SwEdition-
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
UnityEditor Version2017.3.0b9+ SwEdition-
   ApplemacOS Version-
   GoogleAndroid Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.062
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cve@mitre.org 7.4 1.4 5.9
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.4 2.5 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-426 Untrusted Search Path

The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.

CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.