Monday, May 5, 2025
HomeAndroidBlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

Published on

SIEM as a Service

Follow Us on Google News

A significant vulnerability was discovered in BlueStacks, the world’s fastest Android emulator and cloud gaming platform. When used against a victim, this gives attackers complete access to the machine.

The American technology business BlueStacks, also known as BlueStacks by now.gg, Inc., is well-known for developing the BlueStacks App Player and other cloud-based cross-platform applications.

The BlueStacks App Player allows Android applications to run on devices running Microsoft Windows or macOS. 

- Advertisement - Google News

BlueStacks exchanges virtual machine configuration files amongst several OS users and keeps them in a world-writable directory, which makes it feasible for an unauthorized user to backdoor an image and obtain privileged user code execution capabilities.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Understanding The Vulnerability

The critical flaw is identified as BlueStacks privilege escalation via virtual machine backdooring tracked as CVE-2024-33352.

An attacker can automatically add executable code to the virtual machine by changing the BlueStacks configuration.

This allows the attacker to create a backdoor that will launch whenever an authorized user launches the emulator. 

Later, the code may be made to escape Virtual Box and enter the host operating system by reconfiguring the shared directory settings to include the entire C drive.

The attacker would edit the file on the C drive and alter it to enable a virtual machine escape, giving them complete access to the Windows filesystem.

Hence, the attacker installs malicious software on the Android virtual machine (VM), which has the ability to deliver a payload into the host system’s startup directory. 

This payload is run with the victim’s privileges when the victim restarts their computer, granting the attacker complete control.

The vulnerability was brought to light by researcher Maciej Miszczyk. BlueStacks for Windows (versions prior to 10.40.1000.502) are affected.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit...

Chimera Malware: Outsmarting Antivirus, Firewalls, and Human Defenses

X Business, a small e-commerce store dealing in handmade home décor, became the latest...

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs,...

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit...

Chimera Malware: Outsmarting Antivirus, Firewalls, and Human Defenses

X Business, a small e-commerce store dealing in handmade home décor, became the latest...

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs,...