cve/2023/CVE-2023-3513.md
2024-06-18 02:51:15 +02:00

20 lines
1020 B
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-3513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3513)
![](https://img.shields.io/static/v1?label=Product&message=Razer%20Central&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%207.11.0.558%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
### POC
#### Reference
- https://starlabs.sg/advisories/23/23-3513/
#### Github
- https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet
- https://github.com/star-sg/CVE