CVE-2022-23467: CWE-125: Out-of-bounds Read in openrazer openrazer
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
AI Analysis
Technical Summary
CVE-2022-23467 is a medium-severity vulnerability identified in the open source project OpenRazer, which provides drivers and a user-space daemon to control Razer device lighting and features on GNU/Linux systems. The vulnerability is classified as a CWE-125: Out-of-bounds Read. Specifically, it occurs in the function `razer_attr_read_dpi_stages`, where a crafted USB device can trigger an out-of-bounds read, leaking stack memory addresses. This leakage can potentially be used to bypass Kernel Address Space Layout Randomization (KASLR), a security feature designed to randomize the location of kernel code in memory to prevent exploitation. Exploitation requires physical access or social engineering to convince a user to connect a maliciously modified USB device (keyboard or mouse). The vulnerability affects OpenRazer versions prior to 3.5.1, which contains the patch. No known exploits are reported in the wild. The attack vector is local and requires user interaction in the form of plugging in a compromised device. The impact is primarily information disclosure, which can facilitate further attacks by revealing kernel memory layout. However, the vulnerability does not directly allow code execution or privilege escalation on its own. The issue is mitigated by upgrading to OpenRazer 3.5.1 or later and by exercising caution with unknown USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-23467 is moderate but non-trivial. Organizations using GNU/Linux systems with OpenRazer installed—commonly gamers, developers, or specialized users controlling Razer peripherals—could be at risk if attackers gain physical access or trick users into connecting malicious USB devices. The primary risk is information disclosure that could aid attackers in bypassing KASLR, potentially enabling more sophisticated kernel-level exploits. This could lead to privilege escalation or system compromise in subsequent attacks. While the vulnerability itself does not directly compromise system integrity or availability, it lowers the barrier for advanced exploitation. In environments with high physical security, the risk is lower, but in shared or public spaces, or where endpoint security policies are lax, the threat is more significant. Critical infrastructure or organizations with sensitive data using affected devices should consider this vulnerability as part of their broader threat model, especially since USB device attacks are a known vector for targeted intrusions.
Mitigation Recommendations
1. Upgrade all OpenRazer installations to version 3.5.1 or later immediately to apply the patch addressing this vulnerability. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Educate users on the risks of connecting unknown or untrusted USB peripherals, emphasizing social engineering tactics that may be used to introduce malicious devices. 4. Employ physical security controls to limit unauthorized access to workstations and peripherals, especially in shared or public environments. 5. Monitor system logs for unusual USB device connections or driver errors that could indicate attempts to exploit this vulnerability. 6. Consider deploying kernel-level exploit mitigation tools that can detect or prevent attempts to bypass KASLR. 7. For high-security environments, consider isolating systems that require Razer device control from sensitive networks to limit lateral movement if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-23467: CWE-125: Out-of-bounds Read in openrazer openrazer
Description
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
AI-Powered Analysis
Technical Analysis
CVE-2022-23467 is a medium-severity vulnerability identified in the open source project OpenRazer, which provides drivers and a user-space daemon to control Razer device lighting and features on GNU/Linux systems. The vulnerability is classified as a CWE-125: Out-of-bounds Read. Specifically, it occurs in the function `razer_attr_read_dpi_stages`, where a crafted USB device can trigger an out-of-bounds read, leaking stack memory addresses. This leakage can potentially be used to bypass Kernel Address Space Layout Randomization (KASLR), a security feature designed to randomize the location of kernel code in memory to prevent exploitation. Exploitation requires physical access or social engineering to convince a user to connect a maliciously modified USB device (keyboard or mouse). The vulnerability affects OpenRazer versions prior to 3.5.1, which contains the patch. No known exploits are reported in the wild. The attack vector is local and requires user interaction in the form of plugging in a compromised device. The impact is primarily information disclosure, which can facilitate further attacks by revealing kernel memory layout. However, the vulnerability does not directly allow code execution or privilege escalation on its own. The issue is mitigated by upgrading to OpenRazer 3.5.1 or later and by exercising caution with unknown USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-23467 is moderate but non-trivial. Organizations using GNU/Linux systems with OpenRazer installed—commonly gamers, developers, or specialized users controlling Razer peripherals—could be at risk if attackers gain physical access or trick users into connecting malicious USB devices. The primary risk is information disclosure that could aid attackers in bypassing KASLR, potentially enabling more sophisticated kernel-level exploits. This could lead to privilege escalation or system compromise in subsequent attacks. While the vulnerability itself does not directly compromise system integrity or availability, it lowers the barrier for advanced exploitation. In environments with high physical security, the risk is lower, but in shared or public spaces, or where endpoint security policies are lax, the threat is more significant. Critical infrastructure or organizations with sensitive data using affected devices should consider this vulnerability as part of their broader threat model, especially since USB device attacks are a known vector for targeted intrusions.
Mitigation Recommendations
1. Upgrade all OpenRazer installations to version 3.5.1 or later immediately to apply the patch addressing this vulnerability. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Educate users on the risks of connecting unknown or untrusted USB peripherals, emphasizing social engineering tactics that may be used to introduce malicious devices. 4. Employ physical security controls to limit unauthorized access to workstations and peripherals, especially in shared or public environments. 5. Monitor system logs for unusual USB device connections or driver errors that could indicate attempts to exploit this vulnerability. 6. Consider deploying kernel-level exploit mitigation tools that can detect or prevent attempts to bypass KASLR. 7. For high-security environments, consider isolating systems that require Razer device control from sensitive networks to limit lateral movement if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T21:23:53.756Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4bec
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 1:07:36 PM
Last updated: 2/7/2026, 9:03:59 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.