Cyber Posture

CVE-2026-4415

High

Published: 30 March 2026

Published
30 March 2026
Modified
08 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0059 69.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege…

more

escalation.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the relative path traversal (CWE-23) and out-of-bounds write (CWE-787) by validating file path inputs to the pairing feature, preventing arbitrary file writes.

prevent

Restricts Gigabyte Control Center to least functionality by disabling the unnecessary pairing feature, eliminating the unauthenticated remote attack vector.

prevent

Ensures identification, reporting, and correction of the arbitrary file write flaw in Gigabyte Control Center through timely patching or vendor updates.

Security SummaryAI

CVE-2026-4415 is an Arbitrary File Write vulnerability in Gigabyte Control Center, software developed by GIGABYTE. The issue arises when the pairing feature is enabled, allowing unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system. This can lead to arbitrary code execution or privilege escalation. The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-23 (Relative Path Traversal) and CWE-787 (Out-of-bounds Write). It was published on 2026-03-30.

Unauthenticated remote attackers can exploit this vulnerability over the network if the pairing feature is active in Gigabyte Control Center. Exploitation requires high attack complexity but no privileges or user interaction. Successful attacks enable writing files to arbitrary locations, potentially resulting in arbitrary code execution or privilege escalation on the affected system.

Advisories from TWCERT/CC detail the vulnerability and are available at https://www.twcert.org.tw/en/cp-139-10804-689cd-2.html and https://www.twcert.org.tw/tw/cp-132-10803-ae014-1.html, providing guidance on mitigation steps.

Details

CWE(s)

Affected Products

gigabyte
control center
≤ 25.12.10.01

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Unauthenticated remote exploitation over the network of Gigabyte Control Center's pairing feature enables initial access via public-facing application exploitation (T1190) and privilege escalation through arbitrary file writes leading to code execution (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References