Описание
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.12.17 (включая)
cpe:2.3:a:razer:chroma_sdk:*:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.17837
Средний
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-362
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
EPSS
Процентиль: 95%
0.17837
Средний
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-362