Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://www.razer.com/community | vendor advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2022/Mar/51 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2023/Jan/26 | mailing list not applicable |
http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html | not applicable |
http://seclists.org/fulldisclosure/2023/Sep/6 | mailing list |
http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html |