cve/2023/CVE-2023-3513.md

20 lines
1020 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3513)
![](https://img.shields.io/static/v1?label=Product&message=Razer%20Central&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%207.11.0.558%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
### POC
#### Reference
- https://starlabs.sg/advisories/23/23-3513/
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet
2024-05-25 21:48:12 +02:00
- https://github.com/star-sg/CVE