After Razer, SteelSeries Software Also Hit by Zero-Day Vulnerability, SteelSeries Responds (Update)

Update 8/25/2021 1:50 p.m. ET: A SteelSeries spokesperson told Tom's Hardware that SteelSeries is "aware of the issue identified" and "proactively disabled the launch of the SteelSeries installer that is triggered when a new SteelSeries device is plugged in."

"This immediately removes the opportunity for an exploit, and we are working on a software update that will address the issue permanently and be released soon," the spokesperson said. 

Original article 8/25/2021 10:45 p.m. ET: 

More concerning, another security researcher, an0n(@an0n_r0), has proven that it's possible to trigger the software download and installation of SteelSeries software even if you don't own a SteelSeries device. He just used his Android phone that mimicked the SteelSeries keyboard, all while using the USBgadget generator tool.

This is concerning, but it could be worse. This exploit requires physical access, so most users don't have to worry about it. A potential attacker would need an unlocked home screen, which is not easy if the user has protected the computer with a password or any sort of authentication.

  • cryoburner
    This is concerning, but it could be worse. This exploit requires physical access, so most users don't have to worry about it.
    That does not sound concerning at all. Who is this relevant to? If someone has physical access to a system, they could install a new operating system if they wanted. : P
    Reply