Browse all 5 CVE security advisories affecting Razer. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Razer develops gaming peripherals and software, focusing on high-performance hardware for gamers. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often in its software components. The company has addressed security issues through patches, though specific major incidents remain limited. With five CVEs on record, Razer's security posture reflects typical challenges in consumer electronics, where software integration complexity can introduce risks. The organization maintains standard security practices to mitigate threats, though its position in the competitive gaming market necessitates ongoing vigilance against emerging vulnerabilities that could impact user experience and data protection.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-9870 | Razer Synapse 3 RazerPhilipsHueUninstall Link Following Local Privilege Escalation Vulnerability — Synapse 3CWE-59 | 7.8AI | HighAI | 2025-10-29 |
| CVE-2025-9871 | Razer Synapse 3 Chroma Connect Link Following Local Privilege Escalation Vulnerability — Synapse 3CWE-59 | 7.8AI | HighAI | 2025-10-29 |
| CVE-2025-9869 | Razer Synapse 3 Macro Module Link Following Local Privilege Escalation Vulnerability — Synapse 3CWE-59 | 7.8AI | HighAI | 2025-10-29 |
| CVE-2023-3514 | RazerCentralSerivce Unsafe Named Pipe Permission Escalation of Privilege Vulnerability — Razer CentralCWE-269 | 7.8 | High | 2023-07-14 |
| CVE-2023-3513 | RazerCentralService Unsafe Deserialization Escalation of Privilege — Razer CentralCWE-269 | 7.8 | High | 2023-07-14 |
This page lists every published CVE security advisory associated with Razer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.