Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.asus.com/security-advisory |
|
Thu, 16 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via DriverHub Update Process |
Thu, 16 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update process allows privilege escalation due to improper protection of required execution resources during the validation phase, permitting a local user to make unprivileged modifications. This allows the altered resource to pass system checks and be executed with elevated privileges upon a user-initiated update. Refer to the 'Security Update for ASUS DriverHub' section on the ASUS Security Advisory for more information. | |
| First Time appeared |
Asus
Asus driverhub |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:asus:driverhub:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Asus
Asus driverhub |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASUS
Published:
Updated: 2026-04-16T12:31:34.003Z
Reserved: 2026-02-04T08:24:34.633Z
Link: CVE-2026-1880
Updated: 2026-04-16T12:22:15.901Z
Status : Awaiting Analysis
Published: 2026-04-16T03:16:25.857
Modified: 2026-04-17T15:17:00.957
Link: CVE-2026-1880
No data.
OpenCVE Enrichment
Updated: 2026-04-16T09:15:30Z