Razer mouse software bug easily grants Windows admin privileges

Razer mouse software bug easily grants Windows admin privileges

Although Microsoft has been working tirelessly to eliminate that stigma, Windows still retains the image of an operating system that is almost too easy to engage. Many farms of this type are produced at the remote end when people click on suspected links or download software from unofficial sources. However, there comes a time when an exploitation occurs too easily, as when it connects to a razer mouse that, in turn, begins a process that will let almost anyone with physical access to the computer get the administrator’s control of system level.

Windows users are quite accustomed to the concept of “Plug and Play” (also known as “Plug and Reza”), where the new peripherals “simply work” when they connect. That usually involves a program that runs automatically to download and install the device. Drivers and configure the PC to recognize the external device. This system is used by almost all reputable Windows accessories, suggesting that this particular zero day vulnerability is not exclusive to Razer alone.

What makes the issue a little more serious is that Razer’s Sinapse software installer makes it almost too easy to exploit that process. SINAPSE is the application that allows users to configure their Razer hardware with advanced functions, such as keys and towing buttons. The installer for Synapse runs automatically when it connects a razer mouse, and that’s where things go south.

Razerinstaller.exe runs naturally with privileges at the system level to make any changes to the Windows PC. However, it also allows the user to open an instance of file explorer with the same powers, and users can start PowerShell that will allow them to do anything with the system, including the installation of malware. After not getting a Razer’s response, the security researcher @jonhat decided to publicly disclose vulnerability.

The slightly good news is that this exploitation requires that the attacker has physical access to the destination Windows computer and a Razer mouse. The latter is, of course, a penny of a dozen, and it is trivial to buy one to cheap. Breaking its silence, Razer recognized the error and promised to deploy a solution as soon as they can, although it still raises the question of how many installers have similar security holes that expect to be exploited.

Leave a Reply

Your email address will not be published. Required fields are marked *

Facebook test brings video and voice calls back to the main app
Internet

Facebook test brings video and voice calls back to the main app

A few years after making Messenger Mandiri products, Facebook is testing the return of video calls and sounds in its main application, according to the company. This test is only available for some Facebook cellular users, potentially encouraging them to utilize the social media platform as their main way to chat with their friends outside […]

Read More
WhatsApp for iPad native app might be around the corner
Internet

WhatsApp for iPad native app might be around the corner

Although have experienced a resurgence in popularity and sales, there are still a number of popular applications that do not work natively on the iPads are or do not work correctly. Instagram is the child of the latter poster with his suboptimal experience of Apple’s blackboards. WhatsApp, the other property of the social networks of […]

Read More
Chrome on Android 12 will support multiple windows
Internet

Chrome on Android 12 will support multiple windows

Smartphones become more powerful and more important than some of the hard boundaries of the past do not really apply today. Multi-Tasking has become more important than phones earn more RAM and more than one application open at the same time is a staple function on tablets and the new breed of foldable devices. Despite […]

Read More