Search criteria

8 vulnerabilities found for Synaptics Fingerprint Driver by Synaptics

CVE-2025-11772 (GCVE-0-2025-11772)

Vulnerability from cvelistv5 – Published: 2025-12-01 18:55 – Updated: 2025-12-01 19:08
VLAI?
Summary
A carefully crafted DLL, copied to C:\ProgramData\Synaptics folder, allows a local user to execute arbitrary code with elevated privileges during driver installation.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 5.5.3521.1066 , < 5.5.3537.1066 (custom)
Affected: 5.5.4012.1052 , < 5.5.4022.1052 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-01T19:07:50.756015Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-01T19:08:13.939Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "5.5.3537.1066",
              "status": "affected",
              "version": "5.5.3521.1066",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.4022.1052",
              "status": "affected",
              "version": "5.5.4012.1052",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
            }
          ],
          "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-01T18:55:10.227Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2025-12/fingerprint-driver-co-installer-security-brief-2025-12-01.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Co-Installer Privilege Escalation",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2025-11772",
    "datePublished": "2025-12-01T18:55:10.227Z",
    "dateReserved": "2025-10-14T23:34:35.678Z",
    "dateUpdated": "2025-12-01T19:08:13.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-5447 (GCVE-0-2023-5447)

Vulnerability from cvelistv5 – Published: 2024-05-11 02:41 – Updated: 2024-08-02 07:59
VLAI?
Summary
Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App.
CWE
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 6.0.0.1105 , < 6.0.64.1105 (custom)
Affected: 6.0.0.1136 , < 6.0.39.1136 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5447",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-20T14:50:04.526651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:28:42.274Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.64.1105",
              "status": "affected",
              "version": "6.0.0.1105",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.39.1136",
              "status": "affected",
              "version": "6.0.0.1136",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
            }
          ],
          "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-414",
              "description": "CWE-414 Missing Lock Check",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-11T02:41:19.627Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Use-After-Free in Service for Hardware Support App for Fingerprint Driver",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-5447",
    "datePublished": "2024-05-11T02:41:19.627Z",
    "dateReserved": "2023-10-06T08:56:49.136Z",
    "dateUpdated": "2024-08-02T07:59:44.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6482 (GCVE-0-2023-6482)

Vulnerability from cvelistv5 – Published: 2024-01-27 00:19 – Updated: 2024-10-18 14:42
VLAI?
Summary
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
CWE
  • CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 6.0.0.1103 , < 6.0.17.1103 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:28:21.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6482",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-18T14:41:18.102766Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-18T14:42:11.060Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.17.1103",
              "status": "affected",
              "version": "6.0.0.1103",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u0026nbsp;This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
            }
          ],
          "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u00a0This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "CWE-321 Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-29T16:33:12.763Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Encryption key derived from static host information",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-6482",
    "datePublished": "2024-01-27T00:19:15.351Z",
    "dateReserved": "2023-12-04T09:46:38.305Z",
    "dateUpdated": "2024-10-18T14:42:11.060Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3675 (GCVE-0-2021-3675)

Vulnerability from cvelistv5 – Published: 2022-06-16 16:15 – Updated: 2024-09-16 17:38
VLAI?
Summary
Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 5.1.xxx.26 , < xxx=340 (custom)
Affected: 5.2.xxxx.26 , < xxxx=3541 (custom)
Affected: 5.2.2xx.26 , < xx=29 (custom)
Affected: 5.2.3xx.26 , < xx=25 (custom)
Affected: 5.3.xxxx.26 , < xxxx=3543 (custom)
Affected: 5.5.xx.1058 , < xx=44 (custom)
Affected: 5.5.xx.1102 , < xx=34 (custom)
Affected: 5.5.xx.1116 , < xx=14 (custom)
Affected: 6.0.xx.1104 , < xx=50 (custom)
Affected: 6.0.xx.1108 , < xx=31 (custom)
Affected: 6.0.xx.1111 , < xx=58 (custom)
Create a notification for this product.
Credits
Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:08.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "x86/64"
          ],
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "xxx=340",
              "status": "affected",
              "version": "5.1.xxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3541",
              "status": "affected",
              "version": "5.2.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=29",
              "status": "affected",
              "version": "5.2.2xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=25",
              "status": "affected",
              "version": "5.2.3xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3543",
              "status": "affected",
              "version": "5.3.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=44",
              "status": "affected",
              "version": "5.5.xx.1058",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=34",
              "status": "affected",
              "version": "5.5.xx.1102",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=14",
              "status": "affected",
              "version": "5.5.xx.1116",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=50",
              "status": "affected",
              "version": "6.0.xx.1104",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=31",
              "status": "affected",
              "version": "6.0.xx.1108",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=58",
              "status": "affected",
              "version": "6.0.xx.1111",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
        }
      ],
      "datePublic": "2022-06-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-16T16:15:00",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Listed drivers and above have additional input validation."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "synaTEE.signed.dll Out-Of-Bounds Heap Write",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@synaptics.com",
          "DATE_PUBLIC": "2022-06-14T22:44:00.000Z",
          "ID": "CVE-2021-3675",
          "STATE": "PUBLIC",
          "TITLE": "synaTEE.signed.dll Out-Of-Bounds Heap Write"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Synaptics Fingerprint Driver",
                      "version": {
                        "version_data": [
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.1.xxx.26",
                            "version_value": "xxx=340"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.xxxx.26",
                            "version_value": "xxxx=3541"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.2xx.26",
                            "version_value": "xx=29"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.3xx.26",
                            "version_value": "xx=25"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.3.xxxx.26",
                            "version_value": "xxxx=3543"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1058",
                            "version_value": "xx=44"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1102",
                            "version_value": "xx=34"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1116",
                            "version_value": "xx=14"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1104",
                            "version_value": "xx=50"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1108",
                            "version_value": "xx=31"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1111",
                            "version_value": "xx=58"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Synaptics"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf",
              "refsource": "CONFIRM",
              "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-68054",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
            },
            {
              "name": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797",
              "refsource": "MISC",
              "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Listed drivers and above have additional input validation."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2021-3675",
    "datePublished": "2022-06-16T16:15:00.966102Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T17:38:29.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-11772 (GCVE-0-2025-11772)

Vulnerability from nvd – Published: 2025-12-01 18:55 – Updated: 2025-12-01 19:08
VLAI?
Summary
A carefully crafted DLL, copied to C:\ProgramData\Synaptics folder, allows a local user to execute arbitrary code with elevated privileges during driver installation.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 5.5.3521.1066 , < 5.5.3537.1066 (custom)
Affected: 5.5.4012.1052 , < 5.5.4022.1052 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-01T19:07:50.756015Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-01T19:08:13.939Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "5.5.3537.1066",
              "status": "affected",
              "version": "5.5.3521.1066",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.4022.1052",
              "status": "affected",
              "version": "5.5.4012.1052",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
            }
          ],
          "value": "A carefully crafted DLL, copied to \n\nC:\\ProgramData\\Synaptics\n\n folder, allows a local user to execute \narbitrary code with elevated privileges during driver installation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-01T18:55:10.227Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2025-12/fingerprint-driver-co-installer-security-brief-2025-12-01.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Co-Installer Privilege Escalation",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2025-11772",
    "datePublished": "2025-12-01T18:55:10.227Z",
    "dateReserved": "2025-10-14T23:34:35.678Z",
    "dateUpdated": "2025-12-01T19:08:13.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-5447 (GCVE-0-2023-5447)

Vulnerability from nvd – Published: 2024-05-11 02:41 – Updated: 2024-08-02 07:59
VLAI?
Summary
Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App.
CWE
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 6.0.0.1105 , < 6.0.64.1105 (custom)
Affected: 6.0.0.1136 , < 6.0.39.1136 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5447",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-20T14:50:04.526651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:28:42.274Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.64.1105",
              "status": "affected",
              "version": "6.0.0.1105",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.39.1136",
              "status": "affected",
              "version": "6.0.0.1136",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
            }
          ],
          "value": "Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-414",
              "description": "CWE-414 Missing Lock Check",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-11T02:41:19.627Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "url": "https://www.synaptics.com/sites/default/files/2023-10/fingerprint-driver-HSAService-security-brief-2023-10-13.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Use-After-Free in Service for Hardware Support App for Fingerprint Driver",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-5447",
    "datePublished": "2024-05-11T02:41:19.627Z",
    "dateReserved": "2023-10-06T08:56:49.136Z",
    "dateUpdated": "2024-08-02T07:59:44.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6482 (GCVE-0-2023-6482)

Vulnerability from nvd – Published: 2024-01-27 00:19 – Updated: 2024-10-18 14:42
VLAI?
Summary
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
CWE
  • CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 6.0.0.1103 , < 6.0.17.1103 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:28:21.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6482",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-18T14:41:18.102766Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-18T14:42:11.060Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "6.0.17.1103",
              "status": "affected",
              "version": "6.0.0.1103",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u0026nbsp;This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
            }
          ],
          "value": "Use of encryption key derived from static information in Synaptics Fingerprint Driver allows \n\nan attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.\u00a0This may \nallow an attacker, who has physical access to the sensor, to enroll a fingerprint into the \ntemplate database."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "CWE-321 Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-29T16:33:12.763Z",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Encryption key derived from static host information",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2023-6482",
    "datePublished": "2024-01-27T00:19:15.351Z",
    "dateReserved": "2023-12-04T09:46:38.305Z",
    "dateUpdated": "2024-10-18T14:42:11.060Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3675 (GCVE-0-2021-3675)

Vulnerability from nvd – Published: 2022-06-16 16:15 – Updated: 2024-09-16 17:38
VLAI?
Summary
Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Synaptics Synaptics Fingerprint Driver Affected: 5.1.xxx.26 , < xxx=340 (custom)
Affected: 5.2.xxxx.26 , < xxxx=3541 (custom)
Affected: 5.2.2xx.26 , < xx=29 (custom)
Affected: 5.2.3xx.26 , < xx=25 (custom)
Affected: 5.3.xxxx.26 , < xxxx=3543 (custom)
Affected: 5.5.xx.1058 , < xx=44 (custom)
Affected: 5.5.xx.1102 , < xx=34 (custom)
Affected: 5.5.xx.1116 , < xx=14 (custom)
Affected: 6.0.xx.1104 , < xx=50 (custom)
Affected: 6.0.xx.1108 , < xx=31 (custom)
Affected: 6.0.xx.1111 , < xx=58 (custom)
Create a notification for this product.
Credits
Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:08.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "x86/64"
          ],
          "product": "Synaptics Fingerprint Driver",
          "vendor": "Synaptics",
          "versions": [
            {
              "lessThan": "xxx=340",
              "status": "affected",
              "version": "5.1.xxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3541",
              "status": "affected",
              "version": "5.2.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=29",
              "status": "affected",
              "version": "5.2.2xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=25",
              "status": "affected",
              "version": "5.2.3xx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xxxx=3543",
              "status": "affected",
              "version": "5.3.xxxx.26",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=44",
              "status": "affected",
              "version": "5.5.xx.1058",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=34",
              "status": "affected",
              "version": "5.5.xx.1102",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=14",
              "status": "affected",
              "version": "5.5.xx.1116",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=50",
              "status": "affected",
              "version": "6.0.xx.1104",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=31",
              "status": "affected",
              "version": "6.0.xx.1108",
              "versionType": "custom"
            },
            {
              "lessThan": "xx=58",
              "status": "affected",
              "version": "6.0.xx.1111",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
        }
      ],
      "datePublic": "2022-06-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-16T16:15:00",
        "orgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
        "shortName": "Synaptics"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Listed drivers and above have additional input validation."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "synaTEE.signed.dll Out-Of-Bounds Heap Write",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT@synaptics.com",
          "DATE_PUBLIC": "2022-06-14T22:44:00.000Z",
          "ID": "CVE-2021-3675",
          "STATE": "PUBLIC",
          "TITLE": "synaTEE.signed.dll Out-Of-Bounds Heap Write"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Synaptics Fingerprint Driver",
                      "version": {
                        "version_data": [
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.1.xxx.26",
                            "version_value": "xxx=340"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.xxxx.26",
                            "version_value": "xxxx=3541"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.2xx.26",
                            "version_value": "xx=29"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.2.3xx.26",
                            "version_value": "xx=25"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.3.xxxx.26",
                            "version_value": "xxxx=3543"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1058",
                            "version_value": "xx=44"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1102",
                            "version_value": "xx=34"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "5.5.xx.1116",
                            "version_value": "xx=14"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1104",
                            "version_value": "xx=50"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1108",
                            "version_value": "xx=31"
                          },
                          {
                            "platform": "x86/64",
                            "version_affected": "\u003c",
                            "version_name": "6.0.xx.1111",
                            "version_value": "xx=58"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Synaptics"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Synaptics would like to thank Tobias Cloosters and Johannes Willbold for reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf",
              "refsource": "CONFIRM",
              "url": "https://synaptics.com/sites/default/files/2022-06/fingerprint-driver-SGX-security-brief-2022-06-14.pdf"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-68054",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-68054"
            },
            {
              "name": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797",
              "refsource": "MISC",
              "url": "https://support.hp.com/us-en/document/ish_6411153-6411191-16/hpsbhf03797"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Listed drivers and above have additional input validation."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bb2a58-4278-44a9-851f-17e74ee51f48",
    "assignerShortName": "Synaptics",
    "cveId": "CVE-2021-3675",
    "datePublished": "2022-06-16T16:15:00.966102Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T17:38:29.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}