Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Administrative rights gained through Razer devices on Windows 10

Administrative rights gained through Razer devices on Windows 10

Posted on 25/08/202130/09/2023 Christian By Christian No Comments on Administrative rights gained through Razer devices on Windows 10
Razer

A Razer Synapse is a software that allows users to configure their hardware devices, set up macros, or map buttons. Recently, security researchers uncovered a zero-day vulnerability in Razer devices. This vulnerability allowed attackers to gain Windows administrative rights gained through Razer devices like mouse or keyboard when plugged in. Razer, a popular computer peripheral manufacturer known for its gaming mice and keyboards. Upon connecting a Razer device to a Windows device, the operating system automatically downloads the Razer Synapse software and initiates its installation on the computer. According to Razer, the Razer Synapse software currently serves over 100 million users worldwide

How is the administrative right obtained? Security researcher Jonhat discovered and tweeted about the zero-day vulnerability in the plug-and-play installation of Razer Synapse that allows users to quickly gain SYSTEM privileges on a Windows device. SYSTEM privileges are the highest user rights available in Windows and allow someone to execute any command on the operating system. Essentially, when a user is given SYSTEM permissions in Windows, they get complete control of the system and can install anything they want, including malware.

After not receiving a response from Razer, Jonhat disclosed the zero-day vulnerability on Twitter. They explained how the bug works as shown in the video below.

https://twitter.com/i/status/1429049506021138437

It is worth noting that this is a Local Privilege Escalation (LPE) vulnerability. Which means you must have a Razer device and also physical access to the Windows device. Following the attention this zero-day vulnerability gained on Twitter, Razer contacted the security researcher to inform them that they will be issuing a fix.

Jonhat-1

In addition, Razer assured the researcher that they would receive a bug bounty reward, even though the vulnerability had been publicly disclosed.

I hope you found this blog post this vulnerability of administrative rights gained through Razer devices interesting and insightful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: How to install and configure an FTP Server on Windows Server
Next Post: How To Use Azure Key Vault Secrets in Azure Pipelines

Related Posts

  • Featured image 2
    Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
  • encryption 04.05.32
    How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment
  • microsoft ntlm2
    NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
  • azure just in time
    How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
  • drivelock
    How to perform DriveLock quick setup Security | Vulnerability Scans and Assessment
  • MacOS Catalina Desktop
    Mac FileVault Encryption: How to enable FileVault disk encryption Security | Vulnerability Scans and Assessment

More Related Articles

Featured image 2 Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
encryption 04.05.32 How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment
microsoft ntlm2 NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
azure just in time How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
drivelock How to perform DriveLock quick setup Security | Vulnerability Scans and Assessment
MacOS Catalina Desktop Mac FileVault Encryption: How to enable FileVault disk encryption Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Task Scheduler Error 0x2 1
    How to fix Windows Task Scheduler 0x2 Error Windows
  • Screenshot 2021 09 02 at 20.08.14
    Service Principal Name: How to add or reset and delete SPNs Windows
  • screenshot 2020 02 09 at 17.11.11
    How to uninstall a program via command prompt in Windows Windows
  • Deploy Web App from GitHub
    Deploy Code from GitHub to Azure Apps Services via the Command line AWS/Azure/OpenShift
  • windows server 2019 logo
    How to create a Windows Server reference image using WDS Windows Server
  • Manually resize your partition
    KB5034439 Windows Update Error: Resize WinRE Partition Windows Server
  • browser
    How to configure a new tab page URL in Microsoft Edge Windows
  • Ping 3
    How to convert images from PNG to JPG on WordPress, Windows, and Mac JIRA|Confluence|Apps

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.