Notebookcheck Logo

Counter-Strike 2 exploit briefly allows malicious code injection, IP grabbing before developer hastily issues patch

Despite an alarming security vulnerability, Counter-Strike 2 still managed over 1 million concurrent players on December 11. (Image source: Valve)
Despite an alarming security vulnerability, Counter-Strike 2 still managed over 1 million concurrent players on December 11. (Image source: Valve)
A Counter-Strike 2 security vulnerability was discovered this week, allowing enterprising players to access the IP addresses and run code on machines of other players in the game lobby. The exploit affected the lobby voting mechanism that ran web code in the back-end, allowing embedding of local files and scripts. Fortunately, Valve has already issued a patch to close the exploit.

The months following the launch of a new game are rough for any developer — especially an online game — but it's not commonplace for developers to face security vulnerabilities in their games that could cause serious issues for its players.

This seems to be exactly what happened with Valve's Counter-Strike 2 this week. A number of posts across Reddit and X (fka Twitter) are discussing a security vulnerability in Counter-Strike 2. The vulnerability allowed players to use HTML in their username to run JavaScript and execute an XSS attack on anyone in the same game lobby. 

At first, it seemed as though the exploit only allowed bad actors to access IP addresses of other players in the lobby, but it was later revealed that code injection was possible using the same vulnerability. Because of the severity of the attack, players were being advised by security experts, like the folk over at PirateSoftware, to avoid playing Counter-Strike 2 until the vulnerability was fixed.

According to Steam Charts, the security vulnerability seems to not have impacted the player count, with the concurrent player count still peaking at around a million users for the period the exploit was public on December 11. This is compared to the usual daily peak of around 1.1 million players for the week prior.

As of the time of writing, it appears as though Valve has patched out the exploit, and discussions online indicate that it may be possible for Valve to easily detect who took advantage of the issue. That means that anyone who took advantage of the vulnerability could be subject to a VAC ban.

Buy an Asus ROG Ally from Best Buy, or snag an 8Bitdo Ultimate Bluetooth Controller with Hall Effect Sensing Joystick and Charging Dock on Amazon.

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2023 12 > Counter-Strike 2 exploit briefly allows malicious code injection, IP grabbing before developer hastily issues patch
Julian van der Merwe, 2023-12-12 (Update: 2023-12-12)