CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A local privilege escalation in the razer_elevation_service.exe in Razer Synapse 4 through 4.0.86.2502180127 allows a local attacker to escalate their privileges via a vulnerable COM interface in the target service.
Analysis
Local privilege escalation vulnerability in Razer Synapse 4 (versions through 4.0.86.2502180127) affecting the razer_elevation_service.exe component. An authenticated local attacker can exploit a vulnerable COM interface to escalate from standard user privileges to SYSTEM/administrative level, gaining full control over the affected system. The vulnerability has a CVSS score of 7.8 (high severity) and requires local access but no user interaction, making it a significant risk for multi-user systems and enterprise deployments.
Technical Context
The vulnerability resides in the razer_elevation_service.exe, a Windows service component of Razer Synapse 4 that operates with elevated (SYSTEM) privileges. The root cause is classified as CWE-269 (Improper Access Control), specifically an inadequately protected COM (Component Object Model) interface. COM is a binary-interface standard for software components in Windows that allows inter-process communication. The vulnerable service fails to properly validate or restrict access to its COM interface methods, allowing a local user with standard privileges to invoke elevated operations. This is a classic Windows privilege escalation vector where a service running as SYSTEM exposes COM methods without proper access control checks (e.g., missing DCOM activation permissions, missing method-level authorization, or insufficient interface authentication). The attack leverages the Windows elevation/privilege escalation mechanism inherent to COM services with insufficient boundary enforcement.
Affected Products
- vendor: Razer Inc.; product: Razer Synapse; versions_affected: 4.0 through 4.0.86.2502180127; component: razer_elevation_service.exe; cpe: cpe:2.3:a:razer:synapse:4.0*:*:*:*:*:windows:*:*; platform: Windows (all supported versions with COM support)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16873