This weekend, safety researcher jonhat disclosed a long-standing safety bug within the Synapse software program related to Razer gaming mice. Throughout software program set up, the wizard produces a clickable hyperlink to the placement the place the software program shall be put in. Clicking that hyperlink opens a File Explorer window to the proposed location—however that File Explorer spawns with
SYSTEM course of ID, not with the person’s.
Have mouse, will root
By itself, this vulnerability in Razer Synapse feels like a minor challenge—in any case, in an effort to launch a software program installer with
SYSTEM privileges, a person would usually have to have
Administrator privileges themselves. Sadly, Synapse is part of the Windows Catalog—which implies that an unprivileged person can simply plug in a Razer mouse, and Home windows Replace will cheerfully obtain and run the exploitable installer routinely.
Jonhat is not the one—and even the primary—researcher to find and publicly disclose this bug. Lee Christensen publicly disclosed the identical bug in July, and based on safety researcher
_MG_, who demonstrated it utilizing an OMG cable to imitate the PCI Device ID of a Razer mouse and exploit the identical vulnerability, researchers have been reporting it fruitlessly for greater than a 12 months.
Vulnerability fixes coming quickly to a Home windows Catalog close to you
Fortunately, Razer appears to have lastly gotten the memo—jonhat reported that the corporate reached out to him shortly after his August 21 public disclosure to guarantee him that its safety group is “engaged on a repair ASAP,” and the corporate even supplied him a bounty regardless of the general public disclosure.
As soon as Razer itself has patched the vulnerability, the subsequent step shall be pushing it to Microsoft for inclusion in Home windows Catalog—the place it might want to exchange the present and susceptible Razer HIDClass driver that Home windows Replace routinely downloads and runs every time a Razer mouse is plugged into the system. (The susceptible model within the Home windows Catalog as of publishing time is 6.2.9200.16495, dated January 2017.)