First published: Fri Jun 14 2019(Updated: )
An issue was discovered in Electronic Arts Origin before 10.5.39. Due to improper sanitization of the origin:// and origin2:// URI schemes, it is possible to inject additional arguments into the Origin process and ultimately leverage code execution by loading a backdoored Qt plugin remotely via the platformpluginpath argument supplied with a Windows network share.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Electronic Arts Origin | <10.5.39 | |
EA Origin Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12828 is rated as high severity due to its potential for remote code execution.
To fix CVE-2019-12828, update Electronic Arts Origin to version 10.5.39 or later.
The risks include the possibility of an attacker executing arbitrary code on a user's system through the compromised Origin URI schemes.
EA Origin versions prior to 10.5.39 are affected by CVE-2019-12828.
Users of Electronic Arts Origin who have not updated to the secure version are at risk from CVE-2019-12828.