
Right after Razer, SteelSeries Application Also Strike by Zero-Day Vulnerability, SteelSeries Responds (Update)
Update 8/25/2021 1:50 p.m. ET: A SteelSeries spokesperson instructed Tom’s Components that SteelSeries is “knowledgeable
Update 8/25/2021 1:50 p.m. ET: A SteelSeries spokesperson instructed Tom’s Components that SteelSeries is “knowledgeable of the concern discovered” and “proactively disabled the launch of the SteelSeries installer that is activated when a new SteelSeries unit is plugged in.”
“This right away removes the possibility for an exploit, and we are performing on a computer software update that will handle the problem forever and be unveiled shortly,” the spokesperson reported.
Initial short article 8/25/2021 10:45 p.m. ET:
We have lately reported new vulnerabilities found with Razer products. The Synapse application allows destructive actors to receive admin rights in the Home windows 10 working program devoid of any authentication. Right now, a new report implies that SteelSeries and its accompanying program for peripherals is also struck by the similar kind of exploit.
When protection scientists found a vulnerability in Razer software package, it seems to have opened Pandora’s box. In actuality, lots of peripheral makers like Razer and SteelSeries have been shipping computer software vulnerable to exploits that grant admin privileges to unauthorized buyers.
Lawrence Amer of 0xsp has discovered that Windows instantly downloads the accompanying software program and installs it employing admin legal rights when you plug a SteelSeries unit into the computer. You have to concur to license rights through the set up approach, and that is exactly where the exploit starts. You will find a little “Find out extra” button, leading to a website link you open up in Web Explorer. In the upper correct corner, there is a little cog that you can click for equipment. From there, you can click on File > Save and open the CMD window in admin manner from that file explorer. It really is seriously just that simple.
it is not only about @Razer.. it is attainable for all.. just a further priv_escalation with @SteelSeries https://t.co/S2sIa1Lvjv pic.twitter.com/E3NPQnxqo2August 23, 2021
Far more about, yet another stability researcher, an0n(@an0n_r0), has tested that it truly is achievable to set off the computer software download and installation of SteelSeries software package even if you never very own a SteelSeries device. He just applied his Android cellphone that mimicked the SteelSeries keyboard, all while using the USBgadget generator resource.
PoC video for the @SteelSeries LPE (very similar to @Razer) utilizing my Android phone (pretending to be a @SteelSeries USB keyboard. :))Employing my enhanced USBgadget generator resource: https://t.co/Ss74xdySBg@SteelSeries LPE was uncovered by https://t.co/QdSzZMhNER. Far more should follow… 🙂 pic.twitter.com/pKLKRWD8vIAugust 24, 2021
This is about, but it could be even worse. This exploit demands physical access, so most customers do not have to fear about it. A probable attacker would have to have an unlocked property display screen, which is not uncomplicated if the user has secured the laptop or computer with a password or any kind of authentication.