CVE-2021-47742
Unknown Unknown - Not Provided
Insecure Permissions in Rocket League <=1.95 Enables Privilege Escalation

Publication date: 2025-12-31

Last updated on: 2025-12-31

Assigner: VulnCheck

Description
Epic Games Psyonix Rocket League <=1.95 contains an insecure permissions vulnerability that allows authenticated users to modify executable files with full access permissions. Attackers can leverage the 'F' (Full) flag for the 'Authenticated Users' group to change executable files and potentially escalate system privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-31
Last Modified
2025-12-31
Generated
2026-05-07
AI Q&A
2025-12-31
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
epic_games psyonix_rocket_league 1.95
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2021-47742 is a vulnerability in Epic Games Psyonix Rocket League versions up to 1.95 where the executable files have insecure permissions. Specifically, the 'Authenticated Users' group is given 'Full' (F) control permissions, allowing any authenticated user to modify the executable files. This misconfiguration enables attackers to replace the legitimate executable with a malicious binary, potentially escalating their system privileges. [2, 3]


How can this vulnerability impact me? :

This vulnerability can allow an authenticated user on the system to escalate their privileges by modifying the Rocket League executable file. By replacing the legitimate executable with a malicious one, an attacker can gain higher system privileges than intended, potentially compromising system security and control. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the permissions of the Rocket League executable file to see if the 'Authenticated Users' group has 'Full' (F) control permissions. On Windows systems, you can use the command line to inspect the permissions of the executable file. For example, use the command 'icacls "path\to\RocketLeague.exe"' to view the access control list and verify if 'Authenticated Users' have full control permissions. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately remove or restrict the 'Full' (F) control permissions granted to the 'Authenticated Users' group on the Rocket League executable file. Adjust the file permissions to ensure that only trusted users or administrators have write or modify access to the executable. This prevents unauthorized modification of the executable and reduces the risk of privilege escalation. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart