Remote Code Execution in Marvel Rivals Game

Exploit & Technical Design Issues

  • Game client runs with admin privileges “for anti-cheat,” but several commenters call this inexcusable and note sane designs separate a privileged anti-cheat service from the unprivileged game.
  • Core flaw: the game downloads Python bytecode as part of a hotfix/patch system (e.g., to update the in‑game store) and executes it, enabling remote code execution.
  • Traffic to this patch mechanism is reportedly not protected with TLS/DTLS, making MITM trivial for any party on the route: ISPs, cloud providers, compromised routers, LAN cafés, etc.
  • Some compare this to Log4Shell in spirit: an overly powerful, code‑driven mechanism used for simple content updates where a data‑only JSON API would suffice.

Scope & Platforms (PC, LAN cafés, PS5)

  • While many see limited impact for typical home users, others stress risk where networks are less trusted (LAN cafés, some regions, shared machines).
  • On PS5, this yields userland code execution inside the game sandbox. Commenters note it could be a step in a future jailbreak chain but still requires separate kernel/hypervisor exploits to escape the VM.

Anti‑Cheat, Privileges & Effectiveness

  • Strong criticism of kernel‑mode anti‑cheat and always‑on privileged services; they increase attack surface and compromise user control.
  • Several argue anti‑cheat doesn’t even work well: cheating remains rampant, so the tradeoff mainly harms honest players.
  • Others counter that even imperfect anti‑cheat substantially reduces cheating and can rescue games that were overrun.

Security Culture in Game Development

  • Many see this as part of a broader pattern: AAA game engineering often prioritizes shipping, monetization, and performance over security.
  • Debate over whether “game devs” should be held to security standards similar to web/backend engineers:
    • One side: any software shipped to millions with deep system access must meet basic security bar; lack of training is no excuse.
    • Other side: most game devs are not infosec specialists, work under harsh conditions, and responsibility should lie with publishers and dedicated security teams, which in this case seemingly failed.

User Responses & Mitigations

  • Suggestions include: separate gaming PCs or OS partitions, GPU‑passthrough VMs, Steam Deck/SteamOS as semi‑isolated gaming boxes, and treating Windows gaming machines as inherently untrusted.
  • Some share practical Windows workarounds (RunAsInvoker, scheduled tasks) to avoid constant UAC prompts, implicitly acknowledging how normalized elevated‑privilege games have become.