CVE-2023-3514

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges to SYSTEM level on Windows systems running vulnerable versions of RazerCentral. Attackers with low-privilege access can communicate with the RazerCentralService named pipe and execute arbitrary files. Only users with RazerCentral software installed are affected.

💻 Affected Systems

Products:
  • Razer RazerCentral
Versions: <=7.11.0.558
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with RazerCentral software installed. The vulnerability exists in the RazerCentralService component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and full control of the affected system.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install additional malware, or access protected system resources.

🟢

If Mitigated

Limited to low-privilege user actions if proper access controls prevent unauthorized named pipe communication.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Malicious insiders or compromised low-privilege accounts can exploit this to gain SYSTEM privileges on affected workstations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local low-privilege access. The advisory includes technical details that could be used to create exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >7.11.0.558

Vendor Advisory: https://starlabs.sg/advisories/23/23-3514/

Restart Required: Yes

Instructions:

1. Open Razer Central application
2. Check for updates in settings
3. Install any available updates
4. Restart the system

🔧 Temporary Workarounds

Disable RazerCentralService

windows

Stop and disable the vulnerable service to prevent exploitation

sc stop RazerCentralService
sc config RazerCentralService start= disabled

Remove Named Pipe Access

windows

Restrict access to the vulnerable named pipe

icacls "\\.\pipe\RazerCentralService" /deny Everyone:(F)

🧯 If You Can't Patch

  • Uninstall RazerCentral software completely
  • Implement strict least privilege access controls to limit local user permissions

🔍 How to Verify

Check if Vulnerable:

Check RazerCentral version in application settings or via 'wmic product where name="Razer Central" get version'

Check Version:

wmic product where name="Razer Central" get version

Verify Fix Applied:

Verify version is >7.11.0.558 and test named pipe access attempts fail for low-privilege users

📡 Detection & Monitoring

Log Indicators:

  • Unusual named pipe access attempts to RazerCentralService
  • Process creation from RazerCentralService with SYSTEM privileges
  • Failed privilege escalation attempts in security logs

Network Indicators:

  • Local named pipe communication patterns

SIEM Query:

EventID=4688 AND NewProcessName="*RazerCentralService*" AND SubjectUserName!="SYSTEM"

🔗 References

📤 Share & Export