Refine your search

6 vulnerabilities found for by Synaptics

CVE-2025-11772 (GCVE-0-2025-11772)
Vulnerability from cvelistv5
Published
2025-12-01 18:55
Modified
2025-12-01 19:08
CWE
  • CWE-427 - Uncontrolled Search Path Element
Summary
A carefully crafted DLL, copied to C:\ProgramData\Synaptics folder, allows a local user to execute arbitrary code with elevated privileges during driver installation.
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Version: 5.5.3521.1066   < 5.5.3537.1066
Version: 5.5.4012.1052   < 5.5.4022.1052
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-01T19:07:50.756015Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-01T19:08:13.939Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "5.5.3537.1066",
              "status": "affected",
              "version": "5.5.3521.1066",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.4022.1052",
              "status": "affected",
              "version": "5.5.4012.1052",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
            }
          ],
          "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-01T18:55:10.227Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2025-12/fingerprint-driver-co-installer-security-brief-2025-12-01.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Co-Installer Privilege Escalation",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2025-11772",
    "datePublished": "2025-12-01T18:55:10.227Z",
    "dateReserved": "2025-10-14T23:34:35.678Z",
    "dateUpdated": "2025-12-01T19:08:13.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-9157 (GCVE-0-2024-9157)
Vulnerability from cvelistv5
Published
2025-03-11 16:28
Modified
2025-03-11 19:20
CWE
  • CWE-284 - Improper Access Control
Summary
** UNSUPPORTED WHEN ASSIGNED **  A privilege escalation vulnerability in CxUIUSvc64.exe and CxUIUSvc32.exe of Synaptics audio drivers allows a local authorized attacker to load a DLL in a privileged process. Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is End-of-Life and should be removed. For more information on this, refer to the CVE Record’s reference information.
Impacted products
Vendor Product Version
Synaptics Synaptics Audio Driver Version: 0   < 9.0.282.*
Version: 0   < 9.0.285.*
Version: 0   < 9.0.278.*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9157",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-11T19:20:00.613168Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-11T19:20:21.578Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Synaptics Audio Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "9.0.282.*",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "9.0.285.*",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "9.0.278.*",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e** UNSUPPORTED WHEN ASSIGNED **\u0026nbsp;\u003c/p\u003e\u003cp\u003eA privilege escalation vulnerability in CxUIUSvc64.exe and\nCxUIUSvc32.exe of Synaptics audio drivers allows a local authorized\nattacker to load a DLL in a privileged process.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eOut of an abundance of caution, this CVE ID is being\nassigned to better serve our customers and ensure all who are still running\nthis product understand that the product is End-of-Life and should be removed.\nFor more information on this, refer to the CVE Record\u2019s reference information.\u003c/p\u003e\n\n\n\n\n\n\u003cbr\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "** UNSUPPORTED WHEN ASSIGNED **\u00a0\n\nA privilege escalation vulnerability in CxUIUSvc64.exe and\nCxUIUSvc32.exe of Synaptics audio drivers allows a local authorized\nattacker to load a DLL in a privileged process.\n\n\nOut of an abundance of caution, this CVE ID is being\nassigned to better serve our customers and ensure all who are still running\nthis product understand that the product is End-of-Life and should be removed.\nFor more information on this, refer to the CVE Record\u2019s reference information."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-11T16:28:06.178Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2025-03/audio-driver-security-brief-2025-03-11.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "unsupported-when-assigned"
      ],
      "title": "Privilege Escalation Vulnerability in CxUIUSvc service",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2024-9157",
    "datePublished": "2025-03-11T16:28:06.178Z",
    "dateReserved": "2024-09-24T16:04:17.926Z",
    "dateUpdated": "2025-03-11T19:20:21.578Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5447 (GCVE-0-2023-5447)
Vulnerability from cvelistv5
Published
2024-05-11 02:41
Modified
2024-08-02 07:59
CWE
Summary
Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App.
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Version: 6.0.0.1105   < 6.0.64.1105
Version: 6.0.0.1136   < 6.0.39.1136
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5447",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-20T14:50:04.526651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:28:42.274Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.64.1105",
              "status": "affected",
              "version": "6.0.0.1105",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.39.1136",
              "status": "affected",
              "version": "6.0.0.1136",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
            }
          ],
          "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-414",
              "description": "CWE-414 Missing Lock Check",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-11T02:41:19.627Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Use-After-Free in Service for Hardware Support App for Fingerprint Driver",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-5447",
    "datePublished": "2024-05-11T02:41:19.627Z",
    "dateReserved": "2023-10-06T08:56:49.136Z",
    "dateUpdated": "2024-08-02T07:59:44.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6482 (GCVE-0-2023-6482)
Vulnerability from cvelistv5
Published
2024-01-27 00:19
Modified
2024-10-18 14:42
CWE
  • CWE-321 - Use of Hard-coded Cryptographic Key
Summary
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Version: 6.0.0.1103   < 6.0.17.1103
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:28:21.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6482",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-18T14:41:18.102766Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-18T14:42:11.060Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.17.1103",
              "status": "affected",
              "version": "6.0.0.1103",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u0026nbsp;This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
            }
          ],
          "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u00a0This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "CWE-321 Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-29T16:33:12.763Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Encryption key derived from static host information",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-6482",
    "datePublished": "2024-01-27T00:19:15.351Z",
    "dateReserved": "2023-12-04T09:46:38.305Z",
    "dateUpdated": "2024-10-18T14:42:11.060Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4936 (GCVE-0-2023-4936)
Vulnerability from cvelistv5
Published
2023-10-11 17:00
Modified
2024-09-18 18:42
CWE
  • CWE-269 - Improper Privilege Management
Summary
It is possible to sideload a compromised DLL during the installation at elevated privilege.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:44:52.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/products/displaylink-graphics/downloads/windows"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/nr-154525-tc-synaptics_displaylink_windows_driver_security_brief_-_oct2023.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4936",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-18T18:42:15.398969Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-18T18:42:24.025Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "DisplayLink USB Graphics Software for Windows",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThanOrEqual": "11.1 M1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "11.2M0"
            }
          ]
        }
      ],
      "datePublic": "2023-10-11T16:44:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "It is possible to sideload a compromised DLL during the installation at elevated privilege."
            }
          ],
          "value": "It is possible to sideload a compromised DLL during the installation at elevated privilege."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-184",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-184 Software Integrity Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-11T17:00:07.311Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/"
        },
        {
          "url": "https://www.synaptics.com/products/displaylink-graphics/downloads/windows"
        },
        {
          "url": "https://www.synaptics.com/sites/default/files/nr-154525-tc-synaptics_displaylink_windows_driver_security_brief_-_oct2023.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Synaptics-DisplayLink-privilege escalation vulnerability via a dynamic library sideloading",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "update to 11.2M0"
            }
          ],
          "value": "update to 11.2M0"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-4936",
    "datePublished": "2023-10-11T17:00:07.311Z",
    "dateReserved": "2023-09-13T13:08:54.293Z",
    "dateUpdated": "2024-09-18T18:42:24.025Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3675 (GCVE-0-2021-3675)
Vulnerability from cvelistv5
Published
2022-06-16 16:15
Modified
2024-09-16 17:38
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64.
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Version: 5.1.xxx.26   < xxx=340
Version: 5.2.xxxx.26   < xxxx=3541
Version: 5.2.2xx.26   < xx=29
Version: 5.2.3xx.26   < xx=25
Version: 5.3.xxxx.26   < xxxx=3543
Version: 5.5.xx.1058   < xx=44
Version: 5.5.xx.1102   < xx=34
Version: 5.5.xx.1116   < xx=14
Version: 6.0.xx.1104   < xx=50
Version: 6.0.xx.1108   < xx=31
Version: 6.0.xx.1111   < xx=58
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:08.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "x86/64"
          ],
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "xxx=340",
              "status": "affected",
              "version": "5.1.xxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3541",
              "status": "affected",
              "version": "5.2.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=29",
              "status": "affected",
              "version": "5.2.2xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=25",
              "status": "affected",
              "version": "5.2.3xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3543",
              "status": "affected",
              "version": "5.3.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=44",
              "status": "affected",
              "version": "5.5.xx.1058",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=34",
              "status": "affected",
              "version": "5.5.xx.1102",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=14",
              "status": "affected",
              "version": "5.5.xx.1116",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=50",
              "status": "affected",
              "version": "6.0.xx.1104",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=31",
              "status": "affected",
              "version": "6.0.xx.1108",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=58",
              "status": "affected",
              "version": "6.0.xx.1111",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
        }
      ],
      "datePublic": "2022-06-14T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-16T16:15:00.000Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Listed drivers and above have additional input validation."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "synaTEE.signed.dll Out-Of-Bounds Heap Write",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@synaptics.com",
          "DATE_PUBLIC": "2022-06-14T22:44:00.000Z",
          "ID": "CVE-2021-3675",
          "STATE": "PUBLIC",
          "TITLE": "synaTEE.signed.dll Out-Of-Bounds Heap Write"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Synaptics Fingerprint Driver",
                      "version": {
                        "version_data": [
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.1.xxx.26",
                            "version_value": "xxx=340"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.xxxx.26",
                            "version_value": "xxxx=3541"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.2xx.26",
                            "version_value": "xx=29"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.3xx.26",
                            "version_value": "xx=25"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.3.xxxx.26",
                            "version_value": "xxxx=3543"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1058",
                            "version_value": "xx=44"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1102",
                            "version_value": "xx=34"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1116",
                            "version_value": "xx=14"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1104",
                            "version_value": "xx=50"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1108",
                            "version_value": "xx=31"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1111",
                            "version_value": "xx=58"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Synaptics"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf",
              "refsource": "CONFIRM",
              "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-68054",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
            },
            {
              "name": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797",
              "refsource": "MISC",
              "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Listed drivers and above have additional input validation."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2021-3675",
    "datePublished": "2022-06-16T16:15:00.966Z",
    "dateReserved": "2021-08-02T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:38:29.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}