CVE-2023-3513

Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
References
Link Resource
https://starlabs.sg/advisories/23/23-3513/ Exploit Technical Description Vendor Advisory
https://starlabs.sg/advisories/23/23-3513/ Exploit Technical Description Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:razer:razer_central:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 08:17

Type Values Removed Values Added
References () https://starlabs.sg/advisories/23/23-3513/ - Exploit, Technical Description, Vendor Advisory () https://starlabs.sg/advisories/23/23-3513/ - Exploit, Technical Description, Vendor Advisory

27 Jul 2023, 12:58

Type Values Removed Values Added
CWE CWE-269
CPE cpe:2.3:a:razer:razer_central:*:*:*:*:*:windows:*:*
First Time Razer razer Central
Razer
References (MISC) https://starlabs.sg/advisories/23/23-3513/ - (MISC) https://starlabs.sg/advisories/23/23-3513/ - Exploit, Technical Description, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

14 Jul 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-14 05:15

Updated : 2024-11-21 08:17


NVD link : CVE-2023-3513

Mitre link : CVE-2023-3513

CVE.ORG link : CVE-2023-3513


JSON object : View

Products Affected

razer

  • razer_central
CWE
CWE-269

Improper Privilege Management

CWE-502

Deserialization of Untrusted Data