Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Security Flaw in BlueStacks Threatens Millions of Gamers
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Security Flaw in BlueStacks Threatens Millions of Gamers
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » Security Flaw in BlueStacks Threatens Millions of Gamers

Vulnerabilities

Security Flaw in BlueStacks Threatens Millions of Gamers

A serious security flaw in BlueStacks could jeopardize millions of gamers by allowing attackers to gain unauthorized access to their systems.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Security Flaw in BlueStacks Threatens Millions of Gamers
SHARE

A significant security issue has been discovered in BlueStacks for Windows, impacting versions prior to 10.40.1000.502.

BlueStacks is a widely used Android emulator that enables users to effortlessly run Android apps on their Windows computers.

On the other hand, this latest vulnerability could result in unauthorized individuals gaining control of your computer if you are running an outdated version.

The vulnerability occurs due to BlueStacks saving configuration files in a folder that is accessible and modifiable by any user.

It is possible for someone without the necessary permissions to modify these files and gain unauthorized access to certain parts of the computer.

BlueStacks stores its configuration files in the ProgramData directory, which has specific permissions such as:

  • NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F)
  • BUILTIN\Administrators:(I)(OI)(CI)(F)
  • CREATOR OWNER:(I)(OI)(CI)(IO)(F)
  • BUILTIN\Users:(I)(OI)(CI)(RX)
  • BUILTIN\Users:(I)(CI)(WD,AD,WEA,WA)

One important thing to note is that the (F) permission grants unrestricted access and modification rights to all users for these files.

It's possible for anyone without specific permissions to make changes to the files utilized by BlueStacks.

This allows them to insert malicious code that will run whenever BlueStacks is launched by a legitimate user.

This code has the potential to break free from the virtual environment and cause damage to the main operating system.

Here's how an attacker could exploit this vulnerability:

Initially, the attacker would establish a regular user account for themselves and select an administrator account as their objective.

Which then, the attacker would require the target to install a version of BlueStacks that has vulnerabilities.

After installing BlueStacks, the attacker can make changes to a BlueStacks configuration file, like Nougat32.bstk, to enable Android to access the C drive of the Windows system.

Once the configuration has been adjusted, the attacker can effortlessly install a malicious app onto the Android system, which will then initiate automatically.

When the target runs BlueStacks, a malicious app will place a harmful code into the target's startup directory

After the target reboots their computer, the harmful code will execute, granting the attacker control over the system with the target's high-level privileges.

If exploited, this vulnerability could potentially enable an attacker to install malicious software, steal personal information, and gain control of the victim's computer.

Updating BlueStacks to the latest version is highly recommended for protection against this vulnerability. Make sure to download and install the new version released by the developers to fix this problem promptly.

More Stories

Critical Docker Vulnerability Could Grant Hackers Full Access

Deleted Diddy Tweets Are Being Used as Bait to Spread Malware

New Mirai Botnet Flaw That Could Cripple Cyber Attacks

Blur Your Home on Google Maps to Avoid This Scary New Sextortion Scam

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

How a YouTube vulnerability can be used to steal files

How a YouTube Vulnerability Can Be Used to Steal Files

Your Search for Help Could Lead to a Scam Tech Support Scams Are Getting Smarter

Your Search for Help Could Lead to a Scam, Tech Support Scams Are Getting Smarter

NATOs TIDE Think Tank Data Breached

NATO’s TIDE Think-Tank Data Breached, High-Ranking Officials’ Info Exposed

Why Super intelligent AGI Wont Dominate Humanity

Why Super intelligent AGI Won’t Dominate Humanity

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?