CVE-2019-19741
NixOS vulnerability analysis and mitigation

Overview

CVE-2019-19741 affects Electronic Arts Origin 10.5.55.33574, discovered and disclosed in February 2020. This vulnerability allows local privilege escalation through arbitrary directory DACL (Discretionary Access Control List) manipulation. The issue is distinct from related vulnerabilities CVE-2019-19247 and CVE-2019-19248 (MITRE CVE).

Technical details

The vulnerability exploits three key weaknesses in the Origin client: insufficient named pipe client verification where the service verifies the client's executable file instead of its in-memory process, named pipe communication using static encryption keys that can be bypassed by hooking the EVP_EncryptUpdate() function of libeay32.dll, and incomplete mitigations in the CreateDirectory component. The vulnerability has a CVSSv3 score of 7.8 (HIGH) and CVSSv2 score of 7.2 (HIGH) (Medium Blog).

Impact

When successfully exploited, the vulnerability allows an attacker to elevate privileges by manipulating directory access controls. The attacker can achieve arbitrary DACL write capabilities, potentially gaining full system access by modifying service binaries' permissions (Medium Blog).

Mitigation and workarounds

The vulnerability was fixed in Origin version 10.5.56.33908 with the introduction of Restricted Access Mode. However, this mode must be explicitly enabled as it is disabled by default. EA recommends administrators to enable Restricted Access Mode to fully remediate this vulnerability (Medium Blog).

Community reactions

EA acknowledged that while the vulnerability is serious, they noted that less than 5% of their user base operates without administrator-level access, limiting the practical impact of the vulnerability. The disclosure process was described as professional and pleasant by the researcher (Medium Blog).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management