Vulnerability CVE-2021-44226


Published: 2022-03-23   Modified: 2022-03-24

Description:
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Razer Synapse Race Condition / DLL Hijacking
Dr. Oliver Schwa...
18.09.2023

Type:

CWE-269

(Improper Privilege Management)

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
https://www.razer.com/community
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt
http://seclists.org/fulldisclosure/2022/Mar/51
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html

Copyright 2024, cxsecurity.com

 

Back to Top