Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%RazerSynapse3Servicebin even if %PROGRAMDATA%Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there..
Info | Details |
---|---|
CVE ID | CVE-2021-44226 |
CVE State | PUBLISHED |
BaseScore | NA |
BaseSeverity | NA |
VectorString | NA |
Version | NA |
References for CVE-2021-44226 :
https://www.razer.com/community
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt
http://seclists.org/fulldisclosure/2022/Mar/51
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html
http://seclists.org/fulldisclosure/2023/Jan/26
http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html
http://seclists.org/fulldisclosure/2023/Sep/6
http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NA |
AttackComplexity(AC) | NA |
PrivilegesRequired(PR) | NA |
UserInteraction(UI) | NA |
Scope(S) | NA |
Confidentiality(C) | NA |
Availability(A) | NA |
Integrity(I) | NA |