Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html | Not Applicable |
http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html | |
http://seclists.org/fulldisclosure/2022/Mar/51 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2023/Jan/26 | Not Applicable |
http://seclists.org/fulldisclosure/2023/Sep/6 | |
https://www.razer.com/community | Vendor Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-03-23 22:15
Updated : 2023-09-18 16:15
NVD link : CVE-2021-44226
Mitre link : CVE-2021-44226
CVE.ORG link : CVE-2021-44226
JSON object : View
Products Affected
razer
- synapse
microsoft
- windows
CWE
CWE-427
Uncontrolled Search Path Element