Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:razer:synapse:3.5.1030.101917:*:*:*:*:*:*:*", "matchCriteriaId": "E9905986-86A5-4335-946B-8819B7F51624", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations)."}, {"lang": "es", "value": "M\u00faltiples servicios del sistema instalados junto con el paquete de software Razer Synapse versi\u00f3n 3, llevan a cabo operaciones privilegiadas en las entradas dentro de la subclave Razer Chroma SDK. Estas operaciones privilegiadas consisten en la concatenaci\u00f3n de nombres de archivo de un archivo de registro de tiempo de ejecuci\u00f3n que es usado para almacenar informaci\u00f3n de registro de tiempo de ejecuci\u00f3n. En otras palabras, un atacante puede crear un archivo en un directorio no deseado (con algunas limitaciones)"}], "id": "CVE-2021-30494", "lastModified": "2024-11-21T06:04:02.063", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-04-14T15:15:14.753", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://versprite.com/advisories/razer-synapse-3-1/"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://versprite.com/security-resources/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://versprite.com/advisories/razer-synapse-3-1/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://versprite.com/security-resources/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-276"}], "source": "nvd@nist.gov", "type": "Primary"}]}