Nintendo Has Been Patching A “Severe” Vulnerability Found In Some Online Switch, 3DS, And Wii U Games

Switch

Products You May Like

Switch
Image: Damien McFerran / Nintendo Life

Update [Fri 3rd Mar, 2023 15:30 GMT]: Nintendo has announced that it has begun temporary emergency maintenance on Splatoon and Mario Kart 8 for the Wii U.

While unconfirmed, it’s heavily speculated that the maintenance – which at the time of writing has no time frame attached to it – is linked to the ‘ENLBufferPwn’ exploit detailed in the article below.

As a quick reminder, the exploit effectively allows attackers to gain control of target Wii U and 3DS consoles by simply connecting to players online.

Hopefully the maintenance will prevent the exploit from being used in the future, however it’s currently unknown when exactly the online services for Splatoon and Mario Kart 8 will be back up and running.

Nintendo Maintenance
Image: Nintendo

Original Article [Wed 28th Dec, 2022 11:15 GMT]:

A severe vulnerability affecting several Nintendo consoles was found recently, with the potential to allow unauthorised access to Switch, 3DS, and Wii U via a host of online games. It’s reported that for some time Nintendo has been working to patch games to eliminate the exploit known as ‘ENLBufferPwn’, with several updates already live to address the situation (thanks, Nintendo Everything).

The vulnerability, which has been categorised as ‘Critical’ on the Common Vulnerability Scoring System (CVSS) and detailed in full on GitHub by PabloMK7, Rambo6Glaz, and Fishguy6564, reportedly exposes a victim’s device to complete remote control by simply playing an online game with a potential attacker. This means that attackers may gain access to sensitive information or take audio and video recordings by remotely executing code.

The vulnerability was reported to Nintendo in “2021/2022” by @Pablomf6 — who says they received a $1000 “bounty” via Nintendo’s HackerOne program — and it is now understood that the company has taken action to fix the issue in some of the affected games, including Mario Kart 7, which was recently updated after more than a decade.

It seems most high-profile Switch titles have already been fixed, but it looks like Mario Kart 8 and Splatoon on Wii U have yet to be addressed and may still be affected by the vulnerability.

Here’s a list of affected titles, as per the GitHub page:

It’s speculated that other games may also be affected by the vulnerability, although that’s unconfirmed at present.

For a look at the exploit in action, take a peek at the below video from PabloMK7 which demonstrates an attacker (left console) remotely taking over an unmodified 3DS (right side) by copying a return-oriented programming (ROP) payload and executing it remotely. The victim console is then forced to run a custom firmware installer and it’s thought that the same technique would allow an attacker to steal sensitive information from a remote console. Thankfully, this has now been fixed and can no longer be carried out if you’re running the latest version of the software, so be sure to update if you haven’t!

Nintendo’s relatively limited approach to online play seems to have its advantages when it comes to security issues like this, as pointed out by @LuigiBlood discussing the exploit:

Those two games mentioned are Mario Kart 8 and Splatoon, so if you still play either of those titles online on your Wii U, we recommend exercising extreme caution or avoiding them altogether until more information is available. We’ll update this article if further details come to light.

What do you make of this? Share your thoughts in the comments below.

Articles You May Like

Sony Confirms CES 2025 Presser, Fans Already Getting Hopes Up
Sega CEO confirms the company won’t be making more mini retro consoles, like a potential Dreamcast Mini
Sonic X Shadow Generations Full Soundtrack Now Available, Here’s Every Song Included
The sixth RPS Christmas Cracker 2024
Swords & Bones 2: A Retro-Inspired Action RPG with a Modern Edge

Leave a Reply

Your email address will not be published. Required fields are marked *