Vulnerabilities (CVE)

Filtered by vendor Razer Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-3514 1 Razer 1 Razer Central 2023-07-27 N/A 7.8 HIGH
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file.
CVE-2023-3513 1 Razer 1 Razer Central 2023-07-27 N/A 7.8 HIGH
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
CVE-2021-44226 2 Microsoft, Razer 2 Windows, Synapse 2022-07-12 6.9 MEDIUM 7.3 HIGH
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
CVE-2022-29014 1 Razer 2 Sila, Sila Firmware 2022-06-17 5.0 MEDIUM 7.5 HIGH
A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files.
CVE-2017-11652 1 Razer 1 Synapse 2021-08-12 4.6 MEDIUM 8.4 HIGH
Razer Synapse 2.20.15.1104 and earlier uses weak permissions for the CrashReporter directory, which allows local users to gain privileges via a Trojan horse dbghelp.dll file.
CVE-2017-11653 1 Razer 1 Synapse 2021-08-12 4.6 MEDIUM 7.8 HIGH
Razer Synapse 2.20.15.1104 and earlier uses weak permissions for the Devices directory, which allows local users to gain privileges via a Trojan horse (1) RazerConfigNative.dll or (2) RazerConfigNativeLOC.dll file.
CVE-2020-16602 1 Razer 1 Chroma Sdk 2020-11-28 6.8 MEDIUM 8.1 HIGH
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
CVE-2017-14398 1 Razer 1 Synapse 2020-05-20 4.6 MEDIUM 7.8 HIGH
rzpnk.sys in Razer Synapse 2.20.15.1104 allows local users to read and write to arbitrary memory locations, and consequently gain privileges, via a methodology involving a handle to \Device\PhysicalMemory, IOCTL 0x22A064, and ZwMapViewOfSection.