Razer is a prominent computer peripheral manufacturer with expertise in gaming mice and keyboard devices which are used globally by more than 100 thousand customers.
Jonhat, a well-known security researcher identified a zero-day vulnerability in the razor synapse plug and play configuration, which helps the hacker to gain access to admin benefits on a Windows machine easily.
This vulnerability allows cracking into a Windows admin access by just connecting through a Razer mouse or keyboard.
Razer devices have a Local Privilege Escalation (LPE) vulnerability that was reported on 22nd August.
In a demo video posted by Jonhat, When the Razer device is connected to the Windows PC, the razer synapse software gets automatically downloaded and installed.
During the installation process, a dialogue box appears requesting to select a different location of the installation file. You can open the PowerShell window by shift right-clicking the dialog box.
Once the ‘whoami’ command is entered in the PowerShell prompt, it is clear that the console has gained access to the System and can manipulate any command and run them according to the hacker’s wish.
Initially, there was no response from the manufacturers but later Razer responded and promised to fix this issue as soon as possible.