Unity is a popular cross-platform game engine used to develop a wide range of titles for computers, consoles, and mobile devices. Its versatility has also made it a staple in other industries for creating real-time 3D applications. Due to its widespread use, the recent discovery of a critical code execution vulnerability in its runtime component has been a significant concern for both developers and players. This flaw, which affects versions dating back to 2017.1, could allow a malicious application on a user’s device to load and execute an attacker-supplied library, leading to unauthorized code execution and potential data exposure.
In response to this risk, several major players in the gaming industry have taken swift action. Valve, the company behind the popular Steam platform, released a client update to block a specific type of attack vector and advised developers to either rebuild their games using a patched version of Unity or manually replace the vulnerable component. Similarly, Microsoft issued a public bulletin, urging users to uninstall vulnerable games until updated versions become available. The company highlighted that several well-known titles, including Hearthstone and Fallout Shelter, were at risk, underscoring the severity and reach of the issue.
Unity, the developer of the engine, has also addressed the vulnerability, identified as CVE-2025-59489. It acknowledged that the flaw could allow local code execution and access to confidential information on user devices. The company’s primary recommendation for developers is to update their Unity editor to the latest version, then recompile and redeploy their applications. This ensures that the newly created games and apps are built with the patched runtime component, mitigating the risk.
The vulnerability, which was first discovered by researcher ‘RyotaK’ from GMO Flatt Security, stems from the engine’s improper handling of a specific command-line argument. While initially found on Android, the underlying flaw is also present on other operating systems like Windows, macOS, and Linux. On these platforms, different input methods could be used to exploit the vulnerability under specific conditions. Unity has stated that, as of its bulletin’s publication on October 2nd, there have been no confirmed instances of active exploitation in the wild, which is good news for users.
To help developers protect their users, Unity has released fixes for the affected versions, even extending patches to some that are no longer officially supported, specifically those from 2019.1 and later. However, older, unsupported versions will not receive a patch. The remediation process is straightforward: developers can either rebuild their games with a patched editor or simply replace the vulnerable runtime binary with a secure version. This proactive approach helps to quickly secure a massive number of games and applications built with the Unity engine, protecting a vast user base from potential security threats.
Reference: