FKIE_CVE-2021-30494
Vulnerability from fkie_nvd - Published: 2021-04-14 15:15 - Updated: 2024-11-21 06:04
Severity ?
Summary
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://versprite.com/advisories/razer-synapse-3-1/ | Third Party Advisory | |
| cve@mitre.org | https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://versprite.com/security-resources/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://versprite.com/advisories/razer-synapse-3-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://versprite.com/security-resources/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razer:synapse:3.5.1030.101917:*:*:*:*:*:*:*",
"matchCriteriaId": "E9905986-86A5-4335-946B-8819B7F51624",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations)."
},
{
"lang": "es",
"value": "M\u00faltiples servicios del sistema instalados junto con el paquete de software Razer Synapse versi\u00f3n 3, llevan a cabo operaciones privilegiadas en las entradas dentro de la subclave Razer Chroma SDK.\u0026#xa0;Estas operaciones privilegiadas consisten en la concatenaci\u00f3n de nombres de archivo de un archivo de registro de tiempo de ejecuci\u00f3n que es usado para almacenar informaci\u00f3n de registro de tiempo de ejecuci\u00f3n.\u0026#xa0;En otras palabras, un atacante puede crear un archivo en un directorio no deseado (con algunas limitaciones)"
}
],
"id": "CVE-2021-30494",
"lastModified": "2024-11-21T06:04:02.063",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-04-14T15:15:14.753",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://versprite.com/advisories/razer-synapse-3-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://versprite.com/security-resources/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://versprite.com/advisories/razer-synapse-3-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://versprite.com/security-resources/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…