This Week In Security: Through The Mouse Hole, Zoom RCE, And Defeating Defender

Windows security problems due to insecure drivers is nothing new, but this one is kinda special. Plug in a Razer mouse, tell the install dialog you want to install to a non-standard location, and then shift+right click the Explorer window. Choose a powershell, and boom, you now have a SYSTEM shell. It’s not as impressive as an RCE, and it requires hands-on the machine, but it’s beautiful due to the simplicity of it.

The problem is a compound one. First, Windows 10 and 11 automatically downloads and starts the install of Razer Synapse when a Razer device is plugged in. Note it’s not just Razer, any branded app that auto installs like this is possibly vulnerable in the same way. The installation process runs as system, and because it was started automatically, there is no admin account required. The second half of the issue is that the installer itself doesn’t take any precautions to prevent a user from spawning additional processes. There isn’t an obvious way to prevent the launch of Powershell from within the FolderPicker class, so an installer running as SYSTEM would have to go out of its way to drop privileges, to make this a safe process. The real solution is for Microsoft to say no to GUI installers bundled with WHQL signed drivers.
Continue reading “This Week In Security: Through The Mouse Hole, Zoom RCE, And Defeating Defender”

Razer Mouse Grants Windows Admin Privileges

As the common saying goes, “all networked computers are vulnerable to exploits, but some networked computers are more vulnerable than others”. While not the exact wording from Animal Farm, the saying does have plenty of merit nonetheless. Sure, there are some viruses and issues with Linux distributions but by far most of the exploits target Windows, if only because more people use it daily than any other operating system. The latest Windows 10 exploit, discovered by [jonhat], is almost comically easy too, and involves little more than plugging in a mouse.

While slightly comforting in that an attacker would need physical access to the device rather than simple network access, it is very concerning how simple this attack is otherwise. Apparently plugging in a Razer mouse automatically launches Windows Update, which installs a driver for the mouse. The installation is run with admin privileges, and a Power Shell can be opened by the user simply by pressing Shift and right-clicking the mouse. While [jonhat] originally tried to let the company know, they weren’t responsive until he made the exploit public on Twitter, and are now apparently working on solving the issue.

Others have confirmed the exploit does in fact work, so hopefully there is a patch released soon that solves the issue. In the meantime, we recommend not allowing strangers to plug any devices into your personal computers as a general rule, or plugging in anything where its origins are unknown. Also remember that some attacks don’t required physical or network access at all, like this one which remotely sniffs keystrokes from a wireless keyboard with less than stellar security, also coincidentally built by Microsoft.

Eavesdropping By LED

If you ever get the feeling someone is watching you, maybe they are listening, too. At least they might be listening to what’s coming over your computer speakers thanks to a new attack called “glow worm.” In this novel attack, careful observations of a power LED on a speaker allowed an attacker to reproduce the sound playing thanks to virtually imperceptible fluctuations in the LED brightness, most likely due to the speaker’s power line sagging and recovering.

You might think that if you could see the LED, you could just hear the output of the speaker, but a telescope through a window 100 feet away appears to be sufficient. You can imagine that from a distance across a noisy office you might be able to pull the same trick. We don’t know — but we suspect — even if headphones were plugged into the speakers, the LED would still modulate the audio. Any device supplying power to the speakers is a potential source of a leak.

Continue reading “Eavesdropping By LED”

magicBlueSmoke-piStick-featured

How Do You Make A Raspberry Pi On A Stick?

We agree with [magic-blue-smoke] that one of the only things more fun than a standard Raspberry Pi 4 is the Compute Module form factor. If they are not destined to be embedded in a system, these need a breakout board to be useful. Each can be customized with a myriad board shapes and ports, and that’s where the real fun starts. We’ve already seen projects that include custom carrier boards in everything from a 3D Printer to a NAS and one that shows we can build a single-sided board at home complete with high-speed ports.

[magic blue smoke] used this ability to customize the breakout board as an opportunity to create a hackable media player “stick” with the Raspberry Pi built-in. We love that this Raspberry Pi CM4 TV Stick eliminates all the adapters and cables usually required to connect a Pi’s fiddly micro HDMI ports to a display and has heat sinks and an IR receiver to boot. Like a consumer media player HDMI stick, all you need to add is power. Continue reading “How Do You Make A Raspberry Pi On A Stick?”

wood kayak model

Wood And Glue Scale Kayak Is Super

While we don’t feature many woodworking projects here, we always love learning from people who really know their stuff in any medium. [Brian Oltrogge] showed us a hands-off way to shape aluminum with this 3D print sand-casting project and now brings us a very hands-on kayak project.

We have seen kayaks made from plastic wrap and 3D printed parts, and in the video after the break, [Brian Oltrogge] is building a scale model to validate a wood kayak design created with Rhino 3D and Grasshopper. Besides being a joy to watch the craft of the project, the video is full of great hacks. The “buck” that the wood is formed over sits on CNC cut stands that slot into it. The thickness of three layers of laminated veneer fits the 1:4 scale model perfectly representing 3/4” plywood, and the laser-cut parts use the exact pattern that the final full-size CNC will.

spiral saw blade compared to a quarter for scale

There are also some great tool hacks hidden in the video. [Brian Oltrogge] tells us about a spiral scroll saw blade that can cut in any direction, but as a bonus tip, we also can see a clamp compressing the saw while the blade is tensioned. Watch the video through the end to see some clever wall-mounting brackets too.

The video doesn’t tell us what a Stitch & Glue boat is or how the full-scale will be assembled. To find out more about that, see this charmingly odd vintage film from Chesapeake Light Craft.

Thanks for the tip [Keith Olson]

Drone Hits Plane — And This Time It’s A Real (Police) One!

Over the years we’ve brought you many stories that follow the world of aviation as it struggles with the arrival of multirotors. We’ve seen phantom drone encounters cause panics and even shut airports, but it’s been vanishingly rare for such a story to have a basis in evidence. But here we are at last with a drone-aircraft collision story that involves a real drone. This time there’s a twist though, instead of one piloted by a multirotor enthusiast that would prompt a full-on media panic, it’s a police drone that collided with a Cesna landing at Toronto’s Buttonville airport. The York Regional Police craft was part of an operation unrelated to the airport, and its collision with the aircraft on August 10th was enough to make a significant dent in its engine cowling. The police are reported to be awaiting the result of an official investigation in the incident.

This is newsworthy in itself because despite several years and significant resources being devoted to the problem of drones hitting planes, demonstrable cases remain vanishingly rare. The machine in this case being a police one will we expect result in many fewer column inches for the event than had it been flown at the hands of a private multirotor pilot, serving only to heighten the contrast with coverage of previous events such as the Gatwick closure lacking any drone evidence.

It’s picking an easy target to lay into the Your Regional Police over this incident, but it is worth making the point that their reaction would have been disproportionately larger had the drone not been theirs. The CTV news report mentions that air traffic regulators were unaware of the drone’s presence:

NAV Canada, the country’s air navigation service provider, had not been notified about the YRP drone, Transport Canada said.

Given the evident danger to aviation caused by their actions it’s not unreasonable to demand that the officers concerned face the same penalties as would any other multirotor pilot who caused such an incident. We aren’t holding our breath though.

Header image: Raysonho @ Open Grid Scheduler / Grid Engine, CC0.

Homemade electric fan showing a small camera peeking up above the central hub.

Keep Cool With This Face-Following Fan

[AchillesVM] decided to build a tabletop electric fan so it would track him as he moves around the room. Pan and tilt control is provided by a pair of servos controlled by a Raspberry Pi 3b+. How does it know where [AchillesVM} is? It captures the scene using a Raspberry Pi v2 Camera and uses OpenCV’s default face-tracking algorithm to find him. Well, strictly speaking, it tracks anyone’s face around the room. If multiple faces are detected, it follows the largest — which is usually the person closest to the fan.

The whole processing loop runs at 60 ms, so the speed of the servo mechanism is probably the limiting factor when it comes to following fast-moving house guests. At first glance it might look like an old fan from the 1920s, in fact [AchillesVM] built the whole thing by himself, 3D-printing case and using a few off-the-shelf parts (like the 25 cm R/C plane propeller).

It’s a work in progress, so follow his GitHub repository (above) for updates. Hopefully, there will be a front-mounted finger guard coming soon. If you like gadgets that interact with you as you move about, we’ve covered the face-tracking confectionery cannon back in 2014, and the head-tracking water blaster last year. In the “don’t try this” file goes the build that started a career — the eye-tracking laser robot.