cve/2021/CVE-2021-30494.md

19 lines
953 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-30494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30494)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
### POC
#### Reference
- https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/
- https://versprite.com/security-resources/
#### Github
No PoCs found on GitHub currently.