CVE-2026-4415
Published: 30 March 2026
Description
Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege…
more
escalation.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the relative path traversal (CWE-23) and out-of-bounds write (CWE-787) by validating file path inputs to the pairing feature, preventing arbitrary file writes.
Restricts Gigabyte Control Center to least functionality by disabling the unnecessary pairing feature, eliminating the unauthenticated remote attack vector.
Ensures identification, reporting, and correction of the arbitrary file write flaw in Gigabyte Control Center through timely patching or vendor updates.
Security SummaryAI
CVE-2026-4415 is an Arbitrary File Write vulnerability in Gigabyte Control Center, software developed by GIGABYTE. The issue arises when the pairing feature is enabled, allowing unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system. This can lead to arbitrary code execution or privilege escalation. The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-23 (Relative Path Traversal) and CWE-787 (Out-of-bounds Write). It was published on 2026-03-30.
Unauthenticated remote attackers can exploit this vulnerability over the network if the pairing feature is active in Gigabyte Control Center. Exploitation requires high attack complexity but no privileges or user interaction. Successful attacks enable writing files to arbitrary locations, potentially resulting in arbitrary code execution or privilege escalation on the affected system.
Advisories from TWCERT/CC detail the vulnerability and are available at https://www.twcert.org.tw/en/cp-139-10804-689cd-2.html and https://www.twcert.org.tw/tw/cp-132-10803-ae014-1.html, providing guidance on mitigation steps.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation over the network of Gigabyte Control Center's pairing feature enables initial access via public-facing application exploitation (T1190) and privilege escalation through arbitrary file writes leading to code execution (T1068).