Описание
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
Ссылки
- Third Party Advisory
- https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2