Security Update for ASUS Precision Touchpad ' section on the ASUS Security Advisory for more information.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.asus.com/security-advisory |
|
Fri, 08 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Privilege Escalation via Unsane IOCTL in AsusPTPFilter Driver |
Fri, 08 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Exposed IOCTL with Insufficient Access Control vulnerability in AsusPTPFilter allows a local user to bypass driver security mechanisms and obtain restricted touchpad information or render the touchpad unusable via crafted IOCTL requests.Refer to the ' Security Update for ASUS Precision Touchpad ' section on the ASUS Security Advisory for more information. | |
| First Time appeared |
Asus
Asus asusptpfilter |
|
| Weaknesses | CWE-782 | |
| CPEs | cpe:2.3:a:asus:asusptpfilter:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Asus
Asus asusptpfilter |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASUS
Published:
Updated: 2026-05-08T13:02:29.276Z
Reserved: 2026-04-21T06:25:50.061Z
Link: CVE-2026-6737
Updated: 2026-05-08T13:02:26.176Z
Status : Awaiting Analysis
Published: 2026-05-08T03:16:24.990
Modified: 2026-05-08T15:34:56.710
Link: CVE-2026-6737
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:26:18Z