1 / 5
Oct 2025

post by Major_Nelson on Oct 3, 2025

An important message

A security vulnerability was identified that affects games and applications built on Unity versions 2017.1 and later for Android, Windows, Linux, and macOS operating systems. There is no evidence of any exploitation of the vulnerability, nor has there been any impact on users or customers. We have proactively provided fixes that address the vulnerability, and they are already available to all developers. The vulnerability was responsibly reported by the security researcher RyotaK, and we thank him for working with us.

Key Facts:

  • There is no evidence of any exploitation of the vulnerability nor has there been any impact on users or customers.
  • Unity has worked in close collaboration with our platform partners who have taken further steps to secure their platforms and protect end users.
  • Released games or applications using Unity 2017.1 or later for Windows, Android, macOS, or Linux may contain this vulnerability.
  • Unity has released an update for each of the major and minor versions of the Unity Editor starting with Unity 2019.1.
  • Unity has released a binary patcher to patch already-built applications dating back to 2017.1.

What Actions Should You Take?

You need to take action if you have developed and released a game or application using Unity 2017.1 or later for Windows, Android, or macOS. It is imperative that you review the following guidance to ensure the continued safety of your users.

If your project is still in active development:

  • Download the patched update for your version of the Unity Editor, available via Unity Hub or the Unity Download Archive, before building and publishing. This will ensure that your releases are fully protected.

Games and applications already built:

  • We strongly recommend you download the patched update for your version of the Unity Editor, recompile, and republish your application.
  • We have provided a tool to patch already-built applications dating back to 2017.1 for Android, Windows, and macOS for developers who prefer not to rebuild their projects. The tool can be accessed here.

For Android or Windows Applications, some additional protections are being put in place:

  • If your Android application is distributed via Google Play, other third-party Android App stores, or direct download: As an additional layer of defense, Android’s built-in malware scanning and other security features will help reduce risks to users posed by this vulnerability. This does not replace the time critical need to apply the patch update for affected apps. (These protections do not apply to AOSP-based platforms unaffiliated with Google.)
  • If your application targets Windows: For Windows-based applications, Microsoft Defender has been updated and will detect and block the vulnerability. Valve will issue additional protections for the Steam client.

If your application employs tamper-proofing or anti-cheat solutions:

  • You will need to rebuild your project with the patched update for your version of the Unity Editor and redeploy to maintain these protections. Patching your existing application isn’t possible because it will trip the tamper protection.

Additional Platforms:

  • For Horizon OS: Meta devices have implemented mitigations so that vulnerable Unity apps running on Horizon OS cannot be exploited.
  • For Linux: The vulnerability presents a much lower risk on Linux compared to Android, Windows, and macOS.
  • For all other Unity-supported platforms including iOS, there have been no findings to suggest that the vulnerability is exploitable.
  • For the best protection, we always recommend you are on the latest patch release of the version of Unity you are using.

Consumer Guidance:

  • There is no evidence of any exploitation of the vulnerability nor has there been any impact on users or customers.
  • Advise your users to keep their devices and applications updated, enable automatic updates, and maintain current antivirus software.
  • Encourage security best practices, including avoiding suspicious downloads and routinely updating all software.

Our Commitment: Unity is dedicated to the security and integrity of our platform, our customers, and the wider community. Transparent communication is central to this commitment, and we will continue to provide updates as necessary.

For comprehensive technical details, please consult our patching tool and remediation guide, Security Advisory, and CVE-2025-59489.

:red_question_mark: If you have any questions, join us in the CVE Discussions forums and use the CVE Q&A Topic. :red_question_mark:

If you need additional support you can open up a ticket at support.unity.com.

See the full list of affected versions if you shipped on a non-final release.

Please also consult our FAQ.

Your proactive attention to this matter is essential to protect your users and allow you to uphold the highest standards of security.

Unity プラットフォーム保護: ゲームとアプリを保護するために、ただちに対処をお願いします

重要なメッセージ

Unity 2017.1 以降でビルドされた Android、Windows、Linux、macOS オペレーティングシステム向けのゲームとアプリケーションに影響する、セキュリティの脆弱性が最近確認されました。この脆弱性が悪用された証拠はなく、ユーザーまたはお客様に対する影響も発生していません。弊社はこの脆弱性に対処する予防的な修正を提供しており、修正はすでにすべての開発者に対して利用可能になっています。この脆弱性はセキュリティ研究者の RyotaK 氏による責任ある報告によって判明しました。ご協力に感謝します。

重要事項:

  • この脆弱性が悪用された証拠はなく、ユーザーまたはお客様に対する影響も発生していません。
  • Unity はプラットフォームパートナーと緊密に連携しており、プラットフォームパートナーは、それぞれのプラットフォームのセキュリティを確保してエンドユーザーを保護するためのさらなる措置を講じています。
  • Unity 2017.1 以降を使用して Windows、Android、macOS、または Linux 用にリリースされたゲームやアプリケーションには、この脆弱性が含まれている可能性があります。
  • Unity は、Unity 2019.1 以降の Unity エディターの各メジャーバージョンとマイナーバージョンに応じたアップデートをリリース済みです。
  • Unity は、2017.1 にさかのぼる既にビルドされたアプリケーションにパッチを適用するためのバイナリパッチャーをリリース済みです。

どのような対処が必要か?

Unity 2017.1 以降を使用して Windows、Android または macOS 用にゲームまたはアプリケーションを開発しリリース済みの場合は、対処する必要があります。皆様のユーザーの安全を継続的に確保するために、必ず以下のガイダンスをご確認ください。

  • プロジェクトがまだ開発中の場合:
    • ビルドして公開する前に、Unity エディターのバージョンに応じたパッチ適用済みアップデート (Unity Hub または Unity ダウンロードアーカイブ から入手可能) をダウンロードしてください。そうすることで、皆様のリリースが完全に保護されます。
  • すでにビルド済みのゲームやアプリケーション:
    • Unity エディターのバージョンのパッチ適用済みアップデートをダウンロードし、アプリケーションを再コンパイルして、再公開することを強くお勧めします。
    • プロジェクトのリビルドを希望しない開発者向けに、2017.1 までさかのぼってビルド済みの Android、Windows、macOS 向けアプリケーションにパッチを適用するツールを提供しています。ツールは こちら からアクセスできます。
  • Android または Windows アプリケーションに関しては、一定の保護策が追加的に導入されています:
    • Android アプリケーションが Google Play、その他のサードパーティの Android アプリストア、または直接ダウンロードによって配布される場合: Android に組み込まれているマルウェアスキャンおよびその他のセキュリティ機能は、この脆弱性によってユーザーに生じるリスクを軽減する追加の防御層として役立ちます。ただし、これは影響を受けるアプリケーションにパッチアップデートを適用する緊急の必要性に取って代わるものではありません。(これらの保護策は、Google と提携していない AOSP ベースのプラットフォームには適用されません。)
    • アプリケーションが Windows をターゲットとする場合: Windows ベースのアプリケーションの場合は、Microsoft Defender が更新されており、この脆弱性を検出し防ぎます。Valve によって Steam クライアント向けに追加の保護策が提供されます。
  • アプリケーションで改ざん防止またはチート対策ソリューションを採用している場合:
    • そのような保護を維持するには、Unity エディターのバージョンに応じたパッチ適用済みアップデートでプロジェクトをリビルドし再展開する必要があります。改ざん防止機能が作動するため、既存のアプリケーションにパッチを適用することはできません。

その他のプラットフォーム:

  • Horizon OS に関しては、Meta のデバイスに対応策を実装済みであるため、Horizon OS で実行される脆弱な Unity アプリケーションが悪用されることはありません。
  • Linux に関しては、Android、Windows、macOS と比較すると、この脆弱性によるリスクは大幅に低いと言えます。
  • iOS を含む、Unity がサポートするその他すべてのプラットフォームに関しては、この脆弱性が悪用可能であることを示唆する調査結果はありません。
  • 最大限の防御のために、ご使用の Unity バージョンを最新のパッチリリースにしておくことを強くお勧めします。

コンシューマーに関するガイダンス:

  • この脆弱性が悪用された証拠はなく、ユーザーまたはお客様に対する影響も発生していません。
  • ユーザーに対して、デバイスとアプリケーションを最新の状態に保ち、自動更新を有効にして、常に最新のウイルス対策ソフトウェアを使うようにアドバイスしてください。
  • 疑わしいダウンロードの使用を避け、すべてのソフトウェアを定期的に更新するなど、セキュリティのベストプラクティスを奨励してください。

私たちが約束すること: Unity は、プラットフォーム、お客様、より広範なコミュニティのセキュリティと安定のために尽力しています。このコミットメントにおいて重要なのは透明性のあるコミュニケーションであり、必要に応じて引き続き更新情報を提供していきます。

包括的な技術的詳細については、パッチ適用ツールと修正ガイドセキュリティアドバイザリー、CVE-2025-59489 を参照してください。ご質問がある場合は、Discussions にご参加ください。また、追加のサポートが必要な場合は、support.unity.com/hc/ja でチケットを提出できます。

FAQ もご参照ください。

皆様のユーザーを保護し、最高水準のセキュリティを維持できるようにするために、この問題に積極的に対応していただくことが重要です。

Unity 플랫폼 보호: 게임과 앱 보호를 위한 즉각적인 조치

중요 메시지

유니티는 최근 Unity 2017.1 이상 버전으로 빌드된 Android, Windows, Linux, macOS 운영 체제용 게임과 애플리케이션에 영향을 미치는 보안 취약점을 확인했습니다. 취약점의 악용 사례는 발견되지 않았으며, 사용자나 고객에게 미친 영향도 없는 것으로 알려졌습니다. 저희는 선제적으로 이 문제를 파악해 취약점을 해결하는 수정 프로그램을 제공했으며, 이미 모든 개발자가 사용할 수 있습니다. 해당 취약점은 보안 연구원 RyotaK의 책임 있는 보고로 확인되었습니다. 협력에 감사드립니다.

주요 정보:

  • 취약점의 악용 사례는 발견되지 않았으며, 사용자나 고객에게 미친 영향도 없는 것으로 알려졌습니다.
  • 유니티는 플랫폼과 최종 사용자를 안전하게 보호하기 위해 추가 조치를 취한 플랫폼 협력사와 긴밀히 협력했습니다.
  • Unity 2017.1 이상 버전으로 릴리스한 Android, Windows, macOS, Linux용 게임이나 애플리케이션에 이러한 취약점이 포함되어 있을 수 있습니다.
  • Unity 2019.1 이상의 모든 메이저 및 마이너 버전 Unity 에디터의 업데이트를 릴리스했습니다.
  • 유니티는 2017.1 버전까지 이미 빌드된 애플리케이션에 패치를 적용하는 바이너리 패치 프로그램을 릴리스했습니다.

어떤 조치를 취해야 하나요?

Unity 2017.1 이상 버전으로 Android, Windows 또는 macOS용 게임이나 애플리케이션을 개발했거나 릴리스한 경우에는 조치를 취해야 합니다. 사용자 안전을 지속적으로 보장하기 위해 아래 안내 사항을 반드시 검토하시기 바랍니다.

  • 프로젝트가 아직 개발 중인 경우:
    • 빌드하고 퍼블리시하기 전에 사용 중인 Unity 에디터에 해당하는 패치 업데이트를 다운로드하시기 바랍니다(Unity Hub 또는 Unity 다운로드 아카이브를 통해 다운로드 가능). 이렇게 하면 릴리스를 완전히 보호할 수 있습니다.
  • 이미 빌드된 게임 및 애플리케이션의 경우:
    • 사용 중인 Unity 에디터 버전에 해당하는 패치 업데이트를 다운로드하고 애플리케이션을 다시 컴파일한 후 다시 퍼블리시할 것을 적극 권장합니다.
    • 프로젝트를 다시 빌드하고 싶지 않은 개발자들을 위해 2017.1 버전까지 이미 빌드된 애플리케이션에 패치를 적용하는 Android, Windows, macOS용 패치 툴도 제공했습니다. 여기에서 툴에 액세스할 수 있습니다.
  • Android나 Windows 애플리케이션의 경우, 일부 추가 보호 조치 적용 중:
    • Android 애플리케이션이 Google Play, 기타 타사 Android 앱 스토어 또는 직접 다운로드를 통해 배포된 경우: 추가적인 방어 조치로, Android의 빌트인 악성 프로그램 스캔 및 기타 보안 기능이 이 취약점으로 인해 사용자에게 발생할 수 있는 위험을 줄여 줍니다. 하지만 영향을 받는 앱에 시급하게 패치 업데이트를 적용해야 할 필요성은 여전합니다. (이러한 보호 조치는 Google과 제휴를 맺지 않은 AOSP 기반 플랫폼에는 적용되지 않습니다.)
    • Windows 대상 애플리케이션의 경우: Windows 기반 애플리케이션의 경우 Microsoft Defender가 업데이트되어 취약점을 감지하고 차단합니다. Valve는 Steam 클라이언트를 대상으로 추가 보호 조치를 취할 예정입니다.
  • 애플리케이션이 변조 방지 또는 부정 행위 방지 솔루션을 사용하는 경우:
    • 이러한 보호 기능을 유지하려면 사용 중인 Unity 에디터 버전의 최신 패치 업데이트로 프로젝트를 다시 빌드하고 다시 배포해야 합니다. 기존 애플리케이션에 패치를 적용하는 것은 변조 방지 기능이 작동하여 불가능합니다.

추가 플랫폼:

  • Horizon OS: Meta 디바이스에 이미 관련 조치가 적용되어, Horizon OS에서 실행되는 Unity 앱의 취약점이 악용되지 않습니다.
  • Linux: Android, Windows, macOS에 비해 Linux에 취약점이 영향을 미칠 위험은 훨씬 적습니다.
  • iOS를 포함한 다른 모든 Unity 지원 플랫폼에서는 취약점이 악용될 가능성이 발견되지 않았습니다.
  • 최고 수준의 보안을 위해 사용 중인 버전의 Unity는 항상 최신 패치 릴리스가 적용된 상태로 유지할 것을 권장합니다.

소비자 가이드:

  • 취약점의 악용 사례는 발견되지 않았으며, 사용자나 고객에게 미친 영향도 없는 것으로 알려졌습니다.
  • 사용자가 디바이스와 애플리케이션을 최신 상태로 유지하고, 자동 업데이트를 활성화하며, 최신 바이러스 백신 소프트웨어를 사용하도록 조언합니다.
  • 의심스러운 다운로드를 피하고 모든 소프트웨어를 정기적으로 업데이트하는 등, 보안 베스트 프랙티스를 따르도록 독려합니다.

유니티의 책임: 유니티는 플랫폼과 고객, 커뮤니티의 보안과 무결성을 위해 노력하고 있습니다. 투명한 커뮤니케이션은 이러한 노력의 핵심이며, 필요에 따라 지속적으로 업데이트를 제공할 예정입니다.

기술과 관련된 종합적인 세부 정보는 패치 툴 및 문제 해결 가이드, 보안 권고, CVE-2025-59489를 참고하시기 바랍니다. 궁금한 점이 있으면 Discussions 페이지에 참여해 주시고, 추가 지원이 필요한 경우 support.unity.com/hc/ko에서 티켓을 제출하세요.

FAQ 페이지도 참고하시면 도움이 됩니다.

사용자 보호와 최고 수준의 보안 유지를 위해 이 문제에 선제적인 관심을 기울여 주시기를 바랍니다.

read 7 min

post by Major_Nelson on Oct 3, 2025

If you have any questions, join us in the CVE Discussions forums and use the CVE Q&A Topic.

Frequently Asked Questions

1. How do I assess the severity or urgency of this?

  • There is no evidence of any exploitation of the vulnerability nor has there been any impact on users or customers. The CVE security rating is “High”, and we strongly recommend updating your games and apps as soon as you can.

2. What is a CVE?

  • A CVE (Common Vulnerabilities and Exposure) is an industry standard process for disclosing security vulnerabilities based on things like ease of attack or potential damage. The severity ratings range from Low, Medium, High to Critical. For a “High” rating, it’s recommended that you patch your games or apps promptly.

3. Where can I find more detail so that I can assess the severity?

4. Are there protections in place for games on Steam?

  • We have spoken with Valve and they will issue additional protections for the Steam client. For Windows, Microsoft Defender has been updated and will detect and block the vulnerability.

5. Are iOS (including visionOS and tvOS), Xbox, Nintendo Switch, Sony PlayStation, UWP, Quest, and WebGL vulnerable?

  • There have been no findings to suggest that the vulnerability is exploitable on these platforms. For the best protection, we always recommend you are on the latest patch release of the version of Unity you are using.

6. What do you recommend if my project targets multiple platforms, some of which are unaffected?

  • Updated versions of Unity can be used even for platforms that are not vulnerable. However, if you cannot upgrade Unity versions on unaffected platforms, we recommend integrating the patching tool into your build process as a post build step for vulnerable platforms.

7. Are you working with any other anti-virus protection providers?

  • In addition to Microsoft Defender, we are working with Crowdstrike, Fortinet, Sophos, BitDefender, and other EDR (Endpoint Detection and Response) vendors for additional protections.

8. How was the vulnerability discovered?

  • The vulnerability was initially discovered by a third party security researcher.

9. What is the exposure or risk to the end user if the vulnerability is exploited?

10. What action did Unity take once it learned about the vulnerability?

  • We proactively provided fixes that address the vulnerability and they are already available to all developers. In addition, our platform partners have taken further steps to secure their platforms.

11. What if I choose not to do anything?

  • If a developer chooses not to take any action, their application or game built on 2017.1 or later may remain vulnerable and could pose a risk to consumers or device functionality, especially if the issue is later exploited.
  • Google, Meta and Microsoft have taken further steps to secure their platforms but we still strongly recommend developers patch or recompile their games and applications as a precaution.
  • We also recommend that consumers update their devices and applications with the latest versions of software, turn on auto-updates, avoid suspicious downloads, and follow security best practices.

12. What is the process for reporting future vulnerabilities to Unity?

  • We have a Responsible Disclosure policy in place as a part of our ongoing collaboration with internal and external security researchers and also have a Bug Bounty program. For more information on our Bug Bounty program, contact security@unity3d.com or visit our Bug Bounty program on Bugcrowd.

13. What measures are being taken to help prevent similar vulnerabilities in the future?

  • We are continually evolving our comprehensive Secure Software Development Lifecycle (SSDLC) program as we identify risks or vulnerabilities, and leveraging opportunities to further improve the security of our products, including by updating our tooling and processes in response to new discoveries.
  • To help further improve our ability to identify and address similar vulnerabilities, we’re also enhancing our tooling strategy with new scanning tools, implementing updated guidelines, and adding additional steps to our testing process, including a comprehensive penetration testing process.

14. Will my application be pulled from the store if I don’t update?

  • You should contact the app store in question to understand their policy for removing applications with known security vulnerabilities.

15. What should I tell my customers?

  • There is no evidence of any exploitation of the vulnerability, nor has there been any impact on end-users.
  • We have proactively provided fixes that address the vulnerability and they are already available to all developers. In addition, our platform partners have taken further steps to secure their platforms and protect end-users.
  • You can encourage your customers to update their devices and applications with the latest versions of software, turn on auto-updates, avoid suspicious downloads, and follow security best practices.

16. What does the patching tool do to my game?

  • On Android, the patching tool modifies the libunity.so file in a way that prevents the vulnerability from being exploited.
  • On Windows, the patching tool downloads a patched UnityPlayer.dll for your game’s Unity runtime version and replaces the original one.
  • On macOS, the patching tool downloads a patched UnityPlayer.dylib for your game’s Unity runtime version and replaces the original one.
  • Please note that if an app uses tamper-proofing techniques, the patch won’t work. The only way to apply the fix safely and successfully is to rebuild the app from source.

17. Is the fix a breaking change in any way?

18. My game targets a version(s) of the Android SDK and Google Play does not allow app updates to be submitted to the Play Store. If I resubmit, will my update be accepted?

  • We have worked with Google to allow a temporary exception to submission rules specifically for the Android SDK for applications that are already live and patched using our provided patching tool. This exception does not apply to other Google SDKs that may have their own version requirements and it may be necessary to update those SDKs before resubmission. Reach out to Google if you need further information or exceptions for your particular applications

19. Why did you only release an update for Editor versions 2019.1 and later, when the vulnerability impacts back to 2017.1?

  • The number of applications built with the mono runtime on Unity 2017 or 2018 that are still in circulation is quite small and didn’t justify the delay that would have been required to backport fixes to those versions. For applications built with Unity 2017 or 2018, the patching tool should be sufficient to keep them protected.
  • If you have a situation that prevents the patching tool from being an adequate solution, please open a ticket at support.unity.com.

20. Why is the patching tool not available for Linux?

  • The vulnerability presents a much lower risk on Linux compared to Android, Windows, and macOS. For the best protection, we always recommend you are on the latest patch release of the version of Unity you are using.

21. What should I do if I am distributing my game to Pico devices?

  • Pico is not a supported Unity platform so we cannot be confident whether or not the platform is vulnerable. It is based on Android, so you should update your applications to be safe. We have not built our patching tool to be compatible with Pico’s platform and we have some reports from developers that our patching tool conflicts with Pico’s app hardening feature. We recommend developers wanting to ensure the vulnerability is addressed in their applications rebuild their games with our patched Editor releases.

22. Do I need to take my game or application off any platforms to ensure users are protected?

  • There is no need to pull games or applications off any platforms. There is no evidence of any exploitation of the vulnerability nor has there been any impact on users or customers. Unity has proactively provided fixes to developers that address the vulnerability, and many of our platform partners have put additional protections in place.
5 months later

Unpinned on Mar 10

Archived on Mar 10

Unarchived on Mar 10