HomeVulnerabilityGIGABYTE Management Middle weak to arbitrary file write flaw

GIGABYTE Management Middle weak to arbitrary file write flaw

The GIGABYTE Management Middle is weak to an arbitrary file-write flaw that would enable a distant, unauthenticated attacker to entry information on weak hosts.

The {hardware} maker says that profitable exploitation might probably result in code execution on the underlying system, privilege escalation, and a denial-of-service situation.

The GIGABYTE Management Middle (GCC), which comes pre-installed on all the corporate’s laptops and motherboards, is GIGABYTE’s all-in-one Home windows utility that lets customers handle and configure their {hardware}.

It helps {hardware} monitoring, fan management, efficiency tuning, RGB lighting management, driver and firmware updates, and machine administration.

A characteristic within the Management Middle is “pairing,” which permits the software to speak with different gadgets or providers over the community. Programs with the ‘pairing’ choice enabled on Management Middle variations 25.07.21.01 and earlier are uncovered to assaults.

“When the pairing characteristic is enabled, unauthenticated distant attackers can write arbitrary information to any location on the underlying working system, resulting in arbitrary code execution or privilege escalation,” warned Taiwan’s CERT.

See also  8 obstacles girls nonetheless face when searching for a management function in IT

The problem, tracked as CVE-2026-4415, was found by SilentGrid security researcher David Sprüngli. Based mostly on the CVSS v4.0 scoring system, the problem has a essential severity ranking (9.2 out of 10).

Customers are really useful to improve to the newest model of Management Middle, at the moment 25.12.10.01, which incorporates fixes for obtain path administration, message processing, and command encryption to successfully mitigate the vulnerability.

“Prospects are strongly suggested to improve to the newest GCC model instantly,” the seller warns within the security bulletin.

It is suggested that customers of GIGABYTE merchandise obtain the newest GCC model from the seller’s official software program portal to reduce the danger of receiving trojanized installers.

BleepingComputer has contacted each GIGABYTE and SilentGrid to be taught extra about CVE-2026-4415, however we didn’t obtain a response by publishing time.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular