Finnish white-hat hacker that goes by name j0nh4t has found a new vulnerability belongin to game software provider Razer. This vulnerability allows hacker who has physical access to exploit admin rights in Windows 10 and 11 versions.
This particular vulnerability is so called zero day exploit, that has not yet been patched.
Razer is gaming software and equipment provider that has over 100 million users world wide, so the problem is big.
The attack is deployed by plugging in Razer mouse or keyboard to computer. Then Windows Update starts automatic installer loading Razer Synapse software.
During the installation it is possible to open Powershell with administrator rights and access to whole computer that way.
Razer stays quiet before they act
Jonhat tried contacting Razer in several ways only to be left without an answer.
Finally he makes a tweet about it and Razer answers him and gives a “bugbounty” which price jonhat does not want to tell.
Razer is not the only one to blame, because Windows itself allow softwares to be automatically installed when the software are signed with a certificate that belongs to known organisation.
Many ethical hackers claims that this practice is not good as software certificate can easily be manipulated.
This attack was not so severe even though it was not patched immediately because the hacker needed to gain physical access in order to land the exploit.