CVE-2025-68921
Published: 16 January 2026
Summary
CVE-2025-68921 is a high-severity Path Traversal (CWE-22) vulnerability in Steelseries Nahimic. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 21.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents directory traversal exploitation by validating file path inputs to reject traversal sequences like '../'.
Enforces approved access authorizations on file system resources, blocking unauthorized access or manipulation outside intended directories despite traversal attempts.
Limits damage from low-privilege local exploitation by restricting the Nahimic process to only necessary privileges, reducing impact on confidentiality, integrity, and availability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local directory traversal directly enables arbitrary file read/write access on the local system, facilitating data collection from local files outside intended directories.
NVD Description
SteelSeries Nahimic 3 1.10.7 allows Directory traversal.
Deeper analysisAI
CVE-2025-68921 is a directory traversal vulnerability (CWE-22) in SteelSeries Nahimic 3 version 1.10.7. This flaw affects the audio software component provided by SteelSeries, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), classifying it as high severity due to its potential for significant impact on system confidentiality, integrity, and availability.
The vulnerability can be exploited by a local attacker who has low privileges on the target system. Exploitation requires low attack complexity and no user interaction, allowing the attacker to traverse directories and potentially access or manipulate files outside the intended scope, leading to high-impact outcomes across confidentiality, integrity, and availability as scored by CVSS.
Mitigation guidance and additional details are available in the referenced advisories, including a technical gist at https://gist.github.com/ZeroMemoryEx/93208b7e57a5444de3654816857ddef4 and SteelSeries resources at https://steelseries.com/nahimic and https://steelseries.gg. The CVE was published on 2026-01-16T15:15:53.750.
Details
- CWE(s)