Cyber Posture

CVE-2024-51738

High

Published: 20 January 2025

Published
20 January 2025
Modified
11 September 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0184 83.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-51738 is a high-severity Authentication Bypass by Primary Weakness (CWE-305) vulnerability in Lizardbyte Sunshine. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SC-8 (Transmission Confidentiality and Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the pairing protocol flaw by requiring timely patching to the fixed version 2025.118.151840.

prevent

Prevents MITM hijacking of pairing requests by enforcing confidentiality and integrity protections on all network transmissions.

prevent

Protects the authenticity of pairing sessions against hijacking and unauthorized client pairing by requiring session-specific mechanisms.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Vuln enables remote unauthenticated exploitation of public-facing Sunshine server via MITM hijacking of pairing protocol for unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Sunshine is a self-hosted game stream host for Moonlight. In 0.23.1 and earlier, Sunshine's pairing protocol implementation does not validate request order and is thereby vulnerable to a MITM attack, potentially allowing an unauthenticated attacker to pair a client by…

more

hijacking a legitimate pairing attempt. This bug may also be used by a remote attacker to crash Sunshine. This vulnerability is fixed in 2025.118.151840.

Deeper analysisAI

CVE-2024-51738 affects Sunshine, a self-hosted game stream host for Moonlight, in versions 0.23.1 and earlier. The vulnerability stems from the pairing protocol implementation, which fails to validate request order, enabling a man-in-the-middle (MITM) attack. This issue is rated with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-305 (Incorrect Inheritance of Permissions), CWE-476 (NULL Pointer Dereference), and CWE-841 (Improper Enforcement of Behavioral Workflow).

An unauthenticated remote attacker can exploit this vulnerability by positioning themselves between a legitimate client and the Sunshine server during a pairing attempt. By hijacking the pairing process, the attacker can successfully pair their own client, potentially gaining unauthorized access to the game streaming service. Additionally, the flaw allows a remote attacker to crash the Sunshine instance.

The vulnerability has been fixed in version 2025.118.151840. Security practitioners should update to this patched version. Relevant details are available in the GitHub security advisory at https://github.com/LizardByte/Sunshine/security/advisories/GHSA-3hrw-xv8h-9499 and the fixing commit at https://github.com/LizardByte/Sunshine/commit/89f097ae65277d42b5d40163d09d92e412e6d7dd.

Details

CWE(s)

Affected Products

lizardbyte
sunshine
≤ 2025.118.151840

CVEs Like This One

CVE-2026-4670Shared CWE-305
CVE-2026-30849Shared CWE-305
CVE-2025-36386Shared CWE-305
CVE-2026-41259Shared CWE-841
CVE-2026-34582Shared CWE-841
CVE-2025-52469Shared CWE-841
CVE-2025-13915Shared CWE-305
CVE-2025-68435Shared CWE-305
CVE-2025-47776Shared CWE-305
CVE-2025-4320Shared CWE-305

References