CVE-2025-61973
Published: 15 January 2026
Summary
CVE-2025-61973 is a high-severity Improper Access Control (CWE-284) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Executable Installer File Permissions Weakness (T1574.005); ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations preventing low-privilege users from replacing DLL files during installation, directly addressing the improper access control vulnerability.
AC-6 applies least privilege to installation processes and users, mitigating privilege escalation from DLL replacement by limiting necessary access.
CM-5 restricts access to changes during the Epic Games Store installation, preventing unauthorized DLL file modifications by low-privilege users.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local installer DLL replacement enables executable installer file permissions weakness and exploitation for privilege escalation.
NVD Description
A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.
Deeper analysisAI
CVE-2025-61973 is a local privilege escalation vulnerability affecting the installation process of the Epic Games Store when installed via the Microsoft Store. It allows a low-privilege user to replace a DLL file during installation, potentially leading to unintended elevation of privileges. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control).
A local attacker with low privileges can exploit this vulnerability by replacing the targeted DLL file while the Epic Games Store installation is in progress through the Microsoft Store. Successful exploitation enables the attacker to elevate privileges, granting high-impact access to confidentiality, integrity, and availability of system resources due to the high scope (S:C).
Mitigation details and further technical analysis are available in the Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2279 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2279.
Details
- CWE(s)