CVE-2021-44226

Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:razer:synapse:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

18 Sep 2023, 16:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Sep/6 -

22 Feb 2023, 17:39

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html - (MISC) http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html - Not Applicable
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/26 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/26 - Not Applicable

27 Jan 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html -

27 Jan 2023, 06:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/26 -

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 CWE-427

30 Mar 2022, 19:35

Type Values Removed Values Added
References (MISC) https://www.razer.com/community - (MISC) https://www.razer.com/community - Vendor Advisory
References (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt - (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html - (MISC) http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html - Exploit, Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/51 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/51 - Exploit, Mailing List, Third Party Advisory
First Time Microsoft windows
Microsoft
Razer
Razer synapse
CPE cpe:2.3:a:razer:synapse:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.9
v3 : 7.3
CWE CWE-269

28 Mar 2022, 19:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html -

26 Mar 2022, 02:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/51 -

23 Mar 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-23 22:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-44226

Mitre link : CVE-2021-44226

CVE.ORG link : CVE-2021-44226


JSON object : View

Products Affected

microsoft

  • windows

razer

  • synapse
CWE
CWE-427

Uncontrolled Search Path Element