Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
References
| Link | Resource |
|---|---|
| https://www.razer.com/community | Vendor Advisory |
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt | Exploit Third Party Advisory |
| http://seclists.org/fulldisclosure/2022/Mar/51 | Exploit Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html | Exploit Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2023/Jan/26 | Not Applicable |
| http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html | Not Applicable |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2022-03-23 15:15
Updated : 2023-02-22 09:39
NVD link : CVE-2021-44226
Mitre link : CVE-2021-44226
JSON object : View
CWE
CWE-427
Uncontrolled Search Path Element
Products Affected
razer
- synapse
microsoft
- windows


