Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Administrative rights gained through Razer devices on Windows 10
  • VMware vCenter Standalone
    Fix VMware vCenter converter standalone started but not running Virtualization
  • screenshot 2020 04 06 at 04.12.00
    How to install and Configure Pleasant Reset Password Virtualization
  • Featured image 2
    Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
  • VBscript fixed and working in WinPE
    Windows PE working for Windows 11 and Windows Server 2022 Windows Server
  • screenshot 2020 03 21 at 22.44.04 1
    How to create a Microsoft HyperV checkpoint Virtualization
  • ext
    The DriveLock server returned an invalid or unrecognized response Security | Vulnerability Scans and Assessment
  • article 1280x720.78eff5c4
    How to reset your built-in Local Administrator password in Windows 10 Windows Server
  • SysInternals
    Use Active Directory Explorer from Sysinternals Windows

Administrative rights gained through Razer devices on Windows 10

Posted on 25/08/202130/09/2023 Christian By Christian No Comments on Administrative rights gained through Razer devices on Windows 10
Razer

A Razer Synapse is a software that allows users to configure their hardware devices, set up macros, or map buttons. Recently, security researchers uncovered a zero-day vulnerability in Razer devices. This vulnerability allowed attackers to gain Windows administrative rights gained through Razer devices like mouse or keyboard when plugged in. Razer, a popular computer peripheral manufacturer known for its gaming mice and keyboards. Upon connecting a Razer device to a Windows device, the operating system automatically downloads the Razer Synapse software and initiates its installation on the computer. According to Razer, the Razer Synapse software currently serves over 100 million users worldwide

How is the administrative right obtained? Security researcher Jonhat discovered and tweeted about the zero-day vulnerability in the plug-and-play installation of Razer Synapse that allows users to quickly gain SYSTEM privileges on a Windows device. SYSTEM privileges are the highest user rights available in Windows and allow someone to execute any command on the operating system. Essentially, when a user is given SYSTEM permissions in Windows, they get complete control of the system and can install anything they want, including malware.

After not receiving a response from Razer, Jonhat disclosed the zero-day vulnerability on Twitter. They explained how the bug works as shown in the video below.

https://twitter.com/i/status/1429049506021138437

It is worth noting that this is a Local Privilege Escalation (LPE) vulnerability. Which means you must have a Razer device and also physical access to the Windows device. Following the attention this zero-day vulnerability gained on Twitter, Razer contacted the security researcher to inform them that they will be issuing a fix.

Jonhat-1

In addition, Razer assured the researcher that they would receive a bug bounty reward, even though the vulnerability had been publicly disclosed.

I hope you found this blog post this vulnerability of administrative rights gained through Razer devices interesting and insightful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: How to install and configure an FTP Server on Windows Server
Next Post: How To Use Azure Key Vault Secrets in Azure Pipelines

Related Posts

  • Complete Guide on TestRail as a Test Management Tool   banner
    Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment
  • Feature image 1
    Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
  • Trellix configurations after ePo setup
    ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment
  • ePO installation on Windows Server
    Trellix ePolicy Orchestrator Installation on Windows Server Security | Vulnerability Scans and Assessment
  • Featured post.
    How to fix The Group Policy settings for BitLocker startup options are in conflict and cannot be applied Security | Vulnerability Scans and Assessment
  • PetitPotam
    PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS Security | Vulnerability Scans and Assessment

More Related Articles

Complete Guide on TestRail as a Test Management Tool   banner Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment
Feature image 1 Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
Trellix configurations after ePo setup ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment
ePO installation on Windows Server Trellix ePolicy Orchestrator Installation on Windows Server Security | Vulnerability Scans and Assessment
Featured post. How to fix The Group Policy settings for BitLocker startup options are in conflict and cannot be applied Security | Vulnerability Scans and Assessment
PetitPotam PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • VMware vCenter Standalone
    Fix VMware vCenter converter standalone started but not running Virtualization
  • screenshot 2020 04 06 at 04.12.00
    How to install and Configure Pleasant Reset Password Virtualization
  • Featured image 2
    Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
  • VBscript fixed and working in WinPE
    Windows PE working for Windows 11 and Windows Server 2022 Windows Server
  • screenshot 2020 03 21 at 22.44.04 1
    How to create a Microsoft HyperV checkpoint Virtualization
  • ext
    The DriveLock server returned an invalid or unrecognized response Security | Vulnerability Scans and Assessment
  • article 1280x720.78eff5c4
    How to reset your built-in Local Administrator password in Windows 10 Windows Server
  • SysInternals
    Use Active Directory Explorer from Sysinternals Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.