Description
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
References
https://versprite.com/advisories/razer-synapse-3-1/
https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/
https://versprite.com/security-resources/
https://versprite.com/advisories/razer-synapse-3-1/
https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/
https://versprite.com/security-resources/
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-14T13:15:14.753Z
4 years agoLast modified
2024-11-21T05:04:02.063Z
1 year ago