CVE-2022-23467: CWE-125: Out-of-bounds Read in openrazer openrazer
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
AI Analysis
Technical Summary
CVE-2022-23467 is a medium-severity vulnerability identified in the open source project OpenRazer, which provides drivers and a user-space daemon to control Razer device lighting and features on GNU/Linux systems. The vulnerability is classified as a CWE-125: Out-of-bounds Read. Specifically, it occurs in the function `razer_attr_read_dpi_stages`, where a crafted USB device can trigger an out-of-bounds read, leaking stack memory addresses. This leakage can potentially be used to bypass Kernel Address Space Layout Randomization (KASLR), a security feature designed to randomize the location of kernel code in memory to prevent exploitation. Exploitation requires physical access or social engineering to convince a user to connect a maliciously modified USB device (keyboard or mouse). The vulnerability affects OpenRazer versions prior to 3.5.1, which contains the patch. No known exploits are reported in the wild. The attack vector is local and requires user interaction in the form of plugging in a compromised device. The impact is primarily information disclosure, which can facilitate further attacks by revealing kernel memory layout. However, the vulnerability does not directly allow code execution or privilege escalation on its own. The issue is mitigated by upgrading to OpenRazer 3.5.1 or later and by exercising caution with unknown USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-23467 is moderate but non-trivial. Organizations using GNU/Linux systems with OpenRazer installed—commonly gamers, developers, or specialized users controlling Razer peripherals—could be at risk if attackers gain physical access or trick users into connecting malicious USB devices. The primary risk is information disclosure that could aid attackers in bypassing KASLR, potentially enabling more sophisticated kernel-level exploits. This could lead to privilege escalation or system compromise in subsequent attacks. While the vulnerability itself does not directly compromise system integrity or availability, it lowers the barrier for advanced exploitation. In environments with high physical security, the risk is lower, but in shared or public spaces, or where endpoint security policies are lax, the threat is more significant. Critical infrastructure or organizations with sensitive data using affected devices should consider this vulnerability as part of their broader threat model, especially since USB device attacks are a known vector for targeted intrusions.
Mitigation Recommendations
1. Upgrade all OpenRazer installations to version 3.5.1 or later immediately to apply the patch addressing this vulnerability. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Educate users on the risks of connecting unknown or untrusted USB peripherals, emphasizing social engineering tactics that may be used to introduce malicious devices. 4. Employ physical security controls to limit unauthorized access to workstations and peripherals, especially in shared or public environments. 5. Monitor system logs for unusual USB device connections or driver errors that could indicate attempts to exploit this vulnerability. 6. Consider deploying kernel-level exploit mitigation tools that can detect or prevent attempts to bypass KASLR. 7. For high-security environments, consider isolating systems that require Razer device control from sensitive networks to limit lateral movement if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-23467: CWE-125: Out-of-bounds Read in openrazer openrazer
Description
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
AI-Powered Analysis
Technical Analysis
CVE-2022-23467 is a medium-severity vulnerability identified in the open source project OpenRazer, which provides drivers and a user-space daemon to control Razer device lighting and features on GNU/Linux systems. The vulnerability is classified as a CWE-125: Out-of-bounds Read. Specifically, it occurs in the function `razer_attr_read_dpi_stages`, where a crafted USB device can trigger an out-of-bounds read, leaking stack memory addresses. This leakage can potentially be used to bypass Kernel Address Space Layout Randomization (KASLR), a security feature designed to randomize the location of kernel code in memory to prevent exploitation. Exploitation requires physical access or social engineering to convince a user to connect a maliciously modified USB device (keyboard or mouse). The vulnerability affects OpenRazer versions prior to 3.5.1, which contains the patch. No known exploits are reported in the wild. The attack vector is local and requires user interaction in the form of plugging in a compromised device. The impact is primarily information disclosure, which can facilitate further attacks by revealing kernel memory layout. However, the vulnerability does not directly allow code execution or privilege escalation on its own. The issue is mitigated by upgrading to OpenRazer 3.5.1 or later and by exercising caution with unknown USB devices.
Potential Impact
For European organizations, the impact of CVE-2022-23467 is moderate but non-trivial. Organizations using GNU/Linux systems with OpenRazer installed—commonly gamers, developers, or specialized users controlling Razer peripherals—could be at risk if attackers gain physical access or trick users into connecting malicious USB devices. The primary risk is information disclosure that could aid attackers in bypassing KASLR, potentially enabling more sophisticated kernel-level exploits. This could lead to privilege escalation or system compromise in subsequent attacks. While the vulnerability itself does not directly compromise system integrity or availability, it lowers the barrier for advanced exploitation. In environments with high physical security, the risk is lower, but in shared or public spaces, or where endpoint security policies are lax, the threat is more significant. Critical infrastructure or organizations with sensitive data using affected devices should consider this vulnerability as part of their broader threat model, especially since USB device attacks are a known vector for targeted intrusions.
Mitigation Recommendations
1. Upgrade all OpenRazer installations to version 3.5.1 or later immediately to apply the patch addressing this vulnerability. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Educate users on the risks of connecting unknown or untrusted USB peripherals, emphasizing social engineering tactics that may be used to introduce malicious devices. 4. Employ physical security controls to limit unauthorized access to workstations and peripherals, especially in shared or public environments. 5. Monitor system logs for unusual USB device connections or driver errors that could indicate attempts to exploit this vulnerability. 6. Consider deploying kernel-level exploit mitigation tools that can detect or prevent attempts to bypass KASLR. 7. For high-security environments, consider isolating systems that require Razer device control from sensitive networks to limit lateral movement if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T21:23:53.756Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4bec
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 1:07:36 PM
Last updated: 7/26/2025, 7:59:01 PM
Views: 11
Related Threats
CVE-2025-20044: Escalation of Privilege in Intel(R) TDX Module firmware
MediumCVE-2025-49568: Use After Free (CWE-416) in Adobe Illustrator
MediumCVE-2025-49567: NULL Pointer Dereference (CWE-476) in Adobe Illustrator
MediumCVE-2025-49564: Stack-based Buffer Overflow (CWE-121) in Adobe Illustrator
HighCVE-2025-49563: Out-of-bounds Write (CWE-787) in Adobe Illustrator
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.