Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Low

CVE-2017-9770

Disclosure Date: August 02, 2017 (last updated November 26, 2024)
A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse that can cause an out of bounds read operation to occur due to a field within the IOCTL data being used as a length.
0
Attacker Value
High

CVE-2017-9769

Disclosure Date: August 02, 2017 (last updated November 26, 2024)
A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing a handle to be opened to an arbitrary process.
Attacker Value
Unknown

CVE-2022-47631

Disclosure Date: September 14, 2023 (last updated February 17, 2024)
Razer Synapse through 3.7.1209.121307 allows privilege escalation due to an unsafe installation path and improper privilege management. Attackers can place DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if it detects malicious DLLs in this directory, attackers can exploit a race condition and replace a valid DLL (i.e., a copy of a legitimate Razer DLL) with a malicious DLL after the service has already checked the file. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.
Attacker Value
Unknown

CVE-2023-3514

Disclosure Date: July 14, 2023 (last updated October 08, 2023)
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file.
Attacker Value
Unknown

CVE-2023-3513

Disclosure Date: July 14, 2023 (last updated October 08, 2023)
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
Attacker Value
Unknown

CVE-2022-45697

Disclosure Date: February 27, 2023 (last updated October 08, 2023)
Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when handling files in the Accounts directory.
Attacker Value
Unknown

CVE-2022-47632

Disclosure Date: January 27, 2023 (last updated October 08, 2023)
Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.
Attacker Value
Unknown

CVE-2022-23467

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
Attacker Value
Unknown

CVE-2022-29014

Disclosure Date: June 09, 2022 (last updated October 07, 2023)
A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files.
Attacker Value
Unknown

CVE-2022-29013

Disclosure Date: June 09, 2022 (last updated October 07, 2023)
A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.