Platform: Nintendo Switch
Capcom Fighting Collection
Bubsy in: the Purrfect Collection
The Legend of Zelda: Breath of the Wild
Disney Speedstorm
Shantae: Half-Genie Hero
Double Dragon Neon
Undertale
Nickelodeon All-Star Brawl
Volgarr the Viking
Team Sonic Racing
Super Mario 3D World + Bowser's Fury
Super Meat Boy
Dragon Ball Z: Super Butouden
Yo-kai Watch 4++
Danganronpa S: Ultimate Summer Camp
Steep
Payday 2
Wizard101
Fallout Shelter
Garten of Banban 7
Cuphead
Another Crab's Treasure
Stray Gods: The Roleplaying Musical
Splatoon 3
Cave Story+
Phoenix Wright: Ace Attorney Trilogy
LEGO The Incredibles
Mario + Rabbids Sparks of Hope
Pokémon Home
Shin Megami Tensei II
Smite
Trove
Bomb Rush Cyberfunk
Alex Kidd in Miracle World DX
Bust-A-Move
Hello Kitty Island Adventure
Super Mario RPG
The Hundred Line: Last Defense Academy
Portal 2
Hypnospace Outlaw
Arzette: The Jewel of Faramore
James Pond: Codename Robocod
Hard Time III
Nickelodeon Kart Racers 2: Grand Prix
Tomb Raider I•II•III Remastered
Ace Attorney Investigations: Miles Edgeworth
Ys VIII: Lacrimosa of Dana
Danganronpa 2: Goodbye Despair
Ovivo
Omori
Viewing Single Trivia
▲
4
▼
In 2021, dataminers discovered a consistent security vulnerability, later termed "ENLBufferPwn", in multiple Nintendo 3DS, Wii U, and Nintendo Switch games. ENLBufferPwn made it possible to inject code into another player's system during online multiplayer by deliberately triggering a buffer overflow in a game's "ENL" network library. The glitch was known to be possible in Animal Crossing: New Horizons, Arms, Mario Kart 7 (where the glitch instead targets the "Net" library), Mario Kart 8, Mario Kart 8 Deluxe, Nintendo Switch Sports, Splatoon, Splatoon 2, Splatoon 3, and Super Mario Maker 2, with other games potentially being affected.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
GitHub page explaining ENLBufferPwn:
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
Comments (0)
You must be logged in to post comments.