A security flaw in the software of Razer USB mice has been discovered by a hacker. Once used, it quite simply allows you to gain the administrator rights of a system. In other words, an attacker thus obtains the right to do whatever he hears from the targeted PC.
While a 16-year-old security breach currently threatens hundreds of millions of PCs, hacker “JonHat” has discovered a new vulnerability in Razer USB mouse software dubbed Synapse. As he specifies, this bug is located in the interaction between the software and the Windows operating system.
If you are the owner of one of the brand's USB mice, you will know that when you first connect the device to your PC, the installation of the Synapse software is launched automatically. This tool is mainly used to configure the various devices of the brand. In the case of mice, it makes it possible, for example, to assign commands to the various mouse buttons, or to modify the DPI.
However, it turns out that it is a Windows program that automatically starts the download of Synapse. This is where the problem arises. Indeed, the program in question has administrator rights on the PC. And as the hacker explains, it turns out that this program also transfers this level of privilege to Synapse when it is downloaded.
Also read: Windows 365 - Hacker Has Already Stolen Passwords and Usernames
A particularly easy flaw to exploit, on paper
And during the installation of Synapse, the software may offer you to choose an alternative path via the file explorer. This is where the hacker exploits the flaw in question. By doing a simple Shift + right click on the dialog window, the PC will offer to open a PowerShell window (nldr: an interface which allows you to enter various command lines).
And as said above, the hacker can therefore open this window while in Admin mode. Fact, the attacker finds himself in possession of a system console with administrator privileges. In this case, nothing prevents it from installing malware or making any modification on the targeted PC.
After publishing their find on the web, Razer contacted JonHat and promised to release a fix as soon as possible. In addition, the hacker was thanked for his work by the brand, who paid him a bonus as part of its bug hunting program. Note, however, that it was very difficult for an attacker to exploit this flaw. Indeed, there is no way to operate from a distance, physical access to the targeted computer is imperative.
Source : Bleeding Computer
- Windows 10
- Share
- Tweet
- Share
- Envoyer à un ami