A vulnerability has been discovered that allows system privilege elevation simply by connecting a Razer mouse.



A zero-day vulnerability that enables local privilege elevation was discovered in

the tool 'Razer Synapse ' that manages the mouse and keyboard of PC peripheral manufacturer Razer, and it was published on Twitter. Razer is already working on fixing this vulnerability.

Razer bug lets you become a Windows 10 admin by plugging in a mouse
https://www.bleepingcomputer.com/news/security/razer-bug-lets-you-become-a-windows-10-admin-by-plugging-in-a-mouse/

The first time you connect your Razer mouse or keyboard to your Windows PC, we recommend installing a tool called Razer Synapse. This Razer Synapse is a management software that allows you to set mouse buttons and macros.

Security researcher and white hacker jonhat discovered that the Razer Synapse installation process, which involves connecting a mouse or keyboard, is vulnerable to a zero-day vulnerability that makes it easy to gain system privileges on Windows.



The vulnerability requires that the Razer mouse, keyboard, and wireless dongle be physically connected to the PC. RazerInstaller.exe, the Razer Synapse installation executable, launches through a Windows process that runs with system privileges, so RazerInstaller.exe also gains system privileges.



Then, when selecting the folder to install Razer Synapse, you can open PowerShell by holding down the Shift key and right-clicking the 'Select Folder' dialog.



If you enter the 'whoami' command in the actual PowerShell that opens, you will see that you have system privileges.



Security researcher Will Dorman said, 'Given the combination of' the software is automatically loaded when you connect the USB 'and' install the software with system privileges ', other exploits are possible. There may be other packages, 'he said, pointing out that there may be other tools with similar vulnerabilities besides the Razer Synapse.



According to Mr. jonhat, even if he contacted Razer at the beginning, there was no response, so it was released on Twitter, but after the release, Razer's security team said, 'We are working on fixing it as soon as possible.' It seems that there was a report. The vulnerability has already been posted on Twitter, but Razer will pay jonhat a bug-finding bounty.

in Software,   Security, Posted by log1i_yk