Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
References
Link | Resource |
---|---|
https://www.razer.com/community | Vendor Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2022/Mar/51 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jan/26 | Not Applicable |
http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html | Not Applicable |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-03-23 15:15
Updated : 2023-02-22 09:39
NVD link : CVE-2021-44226
Mitre link : CVE-2021-44226
JSON object : View
CWE
CWE-427
Uncontrolled Search Path Element
Products Affected
razer
- synapse
microsoft
- windows