Description
The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:58 AM Eastern, 9/26/21) allows local privilege escalation from any authenticated user to SYSTEM by instructing the Windows service to execute arbitrary commands. This occurs because the attacker can inject a DLL into GalaxyClient.exe, defeating the TCP-based "trusted client" protection mechanism.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_misc
https://www.gog.com/galaxy
Exploit, Third Party Advisory x_refsource_misc
https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/
Exploit, Third Party Advisory x_refsource_misc
https://github.com/jtesta/gog_galaxy_client_service_poc
Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218
Scores
CVSS v3
7.8
EPSS
0.0016
EPSS Percentile
36.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-798
Status
published
Products (1)
gog/galaxy
2.0.13 - 2.0.41
Published
Aug 21, 2020
Tracked Since
Feb 18, 2026