Platform: Wii U
Yoshi's Woolly World
Pokémon Mystery Dungeon: Blue Rescue Team
Duck Hunt
Volgarr the Viking
Super Mario 64
Harvest Moon: More Friends of Mineral Town
The Legend of the Mystical Ninja
Donkey Kong Country: Tropical Freeze
Medal of Honor: Warfighter
Metroid: Zero Mission
Pinball
Super C
NES Remix 2
Densetsu no Starfy 3
Final Fantasy II
Mario Party 10
Mega Man Zero 4
Vegas Stakes
Kururin Paradise
Mega Man Zero 2
Mario & Sonic at the Rio 2016 Olympic Games
Panel de Pon
Demon's Crest
Metroid
Mario vs. Donkey Kong: Tipping Stars
Super Mario Bros. 3
Tennis
Star Fox 64
Harvest Moon 64
Super Mario World: Super Mario Advance 2
Stardew Valley
Super Mario Galaxy 2
Marvelous: Mouhitotsu no Takarajima
Donkey Kong Country 2: Diddy's Kong Quest
Sonic Lost World
Metroid Prime Hunters
Super Mario Kart
Uncharted Waters: New Horizons
Excitebike
Brawl Brothers
Metal Slader Glory
Octodad: Dadliest Catch
Battle City
Drill Dozer
Mega Man Battle Network 6: Cybeast Falzar
Terraria
Mega Man Battle Network 3 Blue
NBA 2K13
Mappy
Dr. Luigi
Viewing Single Trivia
▲
4
▼
In 2021, dataminers discovered a consistent security vulnerability, later termed "ENLBufferPwn", in multiple Nintendo 3DS, Wii U, and Nintendo Switch games. ENLBufferPwn made it possible to inject code into another player's system during online multiplayer by deliberately triggering a buffer overflow in a game's "ENL" network library. The glitch was known to be possible in Animal Crossing: New Horizons, Arms, Mario Kart 7 (where the glitch instead targets the "Net" library), Mario Kart 8, Mario Kart 8 Deluxe, Nintendo Switch Sports, Splatoon, Splatoon 2, Splatoon 3, and Super Mario Maker 2, with other games potentially being affected.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
GitHub page explaining ENLBufferPwn:
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
Comments (0)
You must be logged in to post comments.