Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Security Flaw in BlueStacks Threatens Millions of Gamers
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Security Flaw in BlueStacks Threatens Millions of Gamers
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » Security Flaw in BlueStacks Threatens Millions of Gamers

Vulnerabilities

Security Flaw in BlueStacks Threatens Millions of Gamers

A serious security flaw in BlueStacks could jeopardize millions of gamers by allowing attackers to gain unauthorized access to their systems.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Security Flaw in BlueStacks Threatens Millions of Gamers
SHARE

A significant security issue has been discovered in BlueStacks for Windows, impacting versions prior to 10.40.1000.502.

BlueStacks is a widely used Android emulator that enables users to effortlessly run Android apps on their Windows computers.

On the other hand, this latest vulnerability could result in unauthorized individuals gaining control of your computer if you are running an outdated version.

The vulnerability occurs due to BlueStacks saving configuration files in a folder that is accessible and modifiable by any user.

It is possible for someone without the necessary permissions to modify these files and gain unauthorized access to certain parts of the computer.

BlueStacks stores its configuration files in the ProgramData directory, which has specific permissions such as:

  • NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F)
  • BUILTIN\Administrators:(I)(OI)(CI)(F)
  • CREATOR OWNER:(I)(OI)(CI)(IO)(F)
  • BUILTIN\Users:(I)(OI)(CI)(RX)
  • BUILTIN\Users:(I)(CI)(WD,AD,WEA,WA)

One important thing to note is that the (F) permission grants unrestricted access and modification rights to all users for these files.

It's possible for anyone without specific permissions to make changes to the files utilized by BlueStacks.

This allows them to insert malicious code that will run whenever BlueStacks is launched by a legitimate user.

This code has the potential to break free from the virtual environment and cause damage to the main operating system.

Here's how an attacker could exploit this vulnerability:

Initially, the attacker would establish a regular user account for themselves and select an administrator account as their objective.

Which then, the attacker would require the target to install a version of BlueStacks that has vulnerabilities.

After installing BlueStacks, the attacker can make changes to a BlueStacks configuration file, like Nougat32.bstk, to enable Android to access the C drive of the Windows system.

Once the configuration has been adjusted, the attacker can effortlessly install a malicious app onto the Android system, which will then initiate automatically.

When the target runs BlueStacks, a malicious app will place a harmful code into the target's startup directory

After the target reboots their computer, the harmful code will execute, granting the attacker control over the system with the target's high-level privileges.

If exploited, this vulnerability could potentially enable an attacker to install malicious software, steal personal information, and gain control of the victim's computer.

Updating BlueStacks to the latest version is highly recommended for protection against this vulnerability. Make sure to download and install the new version released by the developers to fix this problem promptly.

More Stories

New WordPress Malware Creates Hidden Admins Accounts While Your Security Tools Are Clueless

Microsoft’s Solution to Its Own Security Problems

Unlimited Free Concerts? Hacker Creates Ticketmaster Generator Tool

Bitcoin’s DoS Vulnerability Lets Hackers Crash Miners For Less Than 1% of a Block

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Turkeys Massive Data Breach Confirmed With a Shrug From Officials

Turkey’s Massive Data Breach Confirmed With a Shrug From Officials

iOS 18 Update Disrupts Vodafones Email Services

Apple’s iOS 18 Update Disrupts Vodafone’s Email Services

Tencent Denies Massive Data Leak of 1.4 Billion QQ Accounts

Tencent Denies Massive Data Leak of 1.4 Billion QQ Accounts

Critical Wordpress Vulnerabilities

Critical WordPress Vulnerabilities and Malicious Plugin Infections

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?