An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update process allows privilege escalation due to improper protection of required execution resources during the validation phase, permitting a local user to make unprivileged modifications. This allows the altered resource to pass system checks and be executed with elevated privileges upon a user-initiated update.
Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information.
Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.asus.com/security-advisory |
|
History
Thu, 16 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update process allows privilege escalation due to improper protection of required execution resources during the validation phase, permitting a local user to make unprivileged modifications. This allows the altered resource to pass system checks and be executed with elevated privileges upon a user-initiated update. Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information. | |
| First Time appeared |
Asus
Asus driverhub |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:asus:driverhub:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Asus
Asus driverhub |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASUS
Published:
Updated: 2026-04-16T02:10:09.128Z
Reserved: 2026-02-04T08:24:34.633Z
Link: CVE-2026-1880
No data.
Status : Received
Published: 2026-04-16T03:16:25.857
Modified: 2026-04-16T03:16:25.857
Link: CVE-2026-1880
No data.
OpenCVE Enrichment
No data.
Weaknesses