Windows 10 Admin Rights Gobbled by Razer Devices

So much for Windows 10’s security: A zero-day in the device installer software grants admin rights just by plugging in a mouse or other compatible device. UPDATE: Microsoft is investigating.

A zero-day bug in the device installer software for Razer peripherals – be they a Razer mouse, keyboard or any device that uses the Synapse utility – gives the plugger-inner full admin rights on Windows 10, just by inserting a compatible peripheral and downloading Synapse.

There’s apparently nothing keeping the vulnerability from allowing the same privilege escalation on Windows 11, although, if that operating system has in fact been tested, its vulnerability hasn’t yet been reported.

Razer manufactures popular, high-end hardware for gamers, including mouses, keyboards and gaming chairs. Its Razer Synapse software enables users to configure hardware devices, set up macros or map buttons.

Infosec Insiders Newsletter

The bug was reported by security researcher jonhat (@j0nh4t), who tweeted about it on Saturday after initially not hearing back from Razer. As of Sunday, the tweet had caught Razer’s attention, and the manufacturer told jonhat that its security team was working on getting out a fix ASAP. It also awarded jonhat a bug bounty, in spite of the fact that the bug was disclosed.

As the researcher tells it and has BleepingComputer confirmed in its own tests, the problem is that when a user plugs in a Razer device (or dongle, if it’s a wireless peripheral), Windows automatically fetches an installer containing driver software and the Synapse utility. The plug-and-play Razer Synapse installation then allows users to gain SYSTEM privileges on the Windows device lickety-split, since, as part of the setup routine, it opens an Explorer window that prompts the user to specify where the driver should be installed.

SYSTEM privileges are the highest user privilege level in Windows: With a SYSTEM account, someone can get full control over the system, meaning that they can view, change or delete data; can create new accounts with full user rights; and can install whatever they want – including malware.

In other words, the setup routine for Synapse runs with the highest available privileges in Windows 10. Since the RazerInstaller.exe executable was launched via a Windows process running with SYSTEM privileges, the Razer installation program inherited those same Admin privileges. jonhat found that if a user opts to change the default location of the installation folder, it triggers a “Choose a folder” dialog. At that point, you can right-click the installation window and press the Shift key, which opens a PowerShell terminal with those same elevated privileges.

Proof-of-Concept Video

When j0nh4t initially didn’t hear back from Razer, the researcher posted a video that shows how the bug works. Below is a version of the video that’s clearer than the one initially shared on Twitter:

BleepingComputer had a Razer mouse kicking around, so the outlet tested out the vulnerability and quickly confirmed the zero day, managing to gain SYSTEM privileges in Windows 10 within about 2 minutes of plugging it in.

Here, There & Everywhere?

Granted, anybody who wants to exploit this local privilege escalation (LPE) vulnerability needs two things: a Razer device and the ability to get at a targeted computer. But, as BleepingComputer pointed out, it can be as easy as spending ~$24 on a Razer mouse and plugging it into Windows 10 to become an admin.

RazerInstaller.exe running with SYSTEM privileges. Source: BleepingComputer.

It doesn’t necessarily stop here, however.

Will Dormann (@wdormann), a vulnerability analyst with the CERT Coordination Center (CERT/CC), suggested that this vulnerability could in fact be universal.

Many vulnerabilities fall into the class of “How has nobody realized this before now?”

If you combine the facts of “connecting USB automatically loads software” and “software installation happens with privileges”, I’ll wager that there are other exploitable packages out there… —Will Dormann

The privilege escalation might be possible in all sorts of peripherals due to the lack of safeguards in Windows that might prevent it.

082321 13:33 UPDATE: Threatpost asked Microsoft for feedback on further safety issues that could arise when it comes to connecting a USB that automatically triggers automatic software loading and when the installation comes with SYSTEM privileges. Microsoft said that it’s aware of recent reports and is investigating the issue. “While this issue requires physical access to a targeted device, we will take any necessary steps to help protect customers,” a Microsoft spokesperson told Threatpost on Monday afternoon.

The vulnerability isn’t necessarily confined to just Razer peripherals. Another commenter, @Lechatquirit, claimed that the attack also works “with any asus ROG mouse. It will prompt to install armory [sic] crate and execute it as Sys,” the user tweeted in response to jonhat. Armoury Crate is a software portal that displays real-time performance and settings information for connected devices and which works with ROG, TUF Gaming and ASUS products.

Razer Calls It a ‘Very Specific’ Attack Vector

A Razer spokesperson told Threatpost on Monday that a fix should be out soon for what it called this “very specific use case.” Here’s the full statement:

We were made aware of a situation in which our software, in a very specific use case, provides a user with broader access to their machine during the installation process.

We have investigated the issue, are currently making changes to the installation application to limit this use case, and will release an updated version shortly. The use of our software (including the installation application) does not provide unauthorized third-party access to the machine.

We are committed to ensuring the digital safety and security of all our systems and services, and should you come across any potential lapses, we encourage you to report them through our bug bounty service, Inspectiv: https://app.inspectiv.com/#/sign-up.

Check out our free upcoming live and on-demand webinar events – unique, dynamic discussions with cybersecurity experts and the Threatpost community.

Suggested articles

Discussion

  • fabian on

    I wonder who doesn't use admin rights on his/hers windows machine. It's pointless and nothing works.

Leave A Reply to fabian Cancel Reply

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.