Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html | Not Applicable |
http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html | |
http://seclists.org/fulldisclosure/2022/Mar/51 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2023/Jan/26 | Not Applicable |
http://seclists.org/fulldisclosure/2023/Sep/6 | |
https://www.razer.com/community | Vendor Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-23T00:00:00
Updated: 2023-09-18T15:06:25.332666
Reserved: 2021-11-26T00:00:00
Link: CVE-2021-44226
JSON object: View
NVD Information
Status : Modified
Published: 2022-03-23T22:15:12.937
Modified: 2023-09-18T16:15:44.463
Link: CVE-2021-44226
JSON object: View
Redhat Information
No data.
CWE