7.3
CVSSv3

CVE-2021-44226

Published: 23/03/2022 Updated: 18/09/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.3 | Impact Score: 5.9 | Exploitability Score: 1.3
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Razer Synapse prior to 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

razer synapse

Exploits

Razer Synapse versions prior to 370228022817 suffer from a dll hijacking vulnerability ...
Razer Synapse versions before 380428042117 (20230601) suffer from multiple vulnerabilities Due to an unsafe installation path, improper privilege management, and a time-of-check time-of-use race condition, the associated system service "Razer Synapse Service" is vulnerable to DLL hijacking As a result, local Windows users can abuse the Razer d ...
Razer Synapse version 370731072516 suffers from a local privilege escalation due to a DLL hijacking vulnerability ...