CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Arbitrary file write vulnerability in GIGABYTE Control Center enables remote code execution

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical arbitrary file-write vulnerability in GIGABYTE Control Center (CVE-2026-4415, CVSS v4.0: 9.2) allows unauthenticated remote attackers to write files to any location on vulnerable systems. This flaw impacts versions 25.07.21.01 and earlier of the pre-installed Windows utility, which manages hardware monitoring, fan control, firmware updates, and RGB lighting. Successful exploitation can lead to arbitrary code execution, privilege escalation, and denial-of-service conditions. The issue is exposed when the 'pairing' feature is enabled, enabling network communication with other devices.

Timeline

  1. 01.04.2026 01:28 1 articles · 1h ago

    Critical arbitrary file-write flaw in GIGABYTE Control Center patched

    GIGABYTE released an updated version of Control Center (25.12.10.01) to address CVE-2026-4415, a critical arbitrary file-write vulnerability affecting versions up to 25.07.21.01. The flaw, discovered by SilentGrid researcher David Sprüngli, allows unauthenticated remote attackers to write files to any location on vulnerable systems when the pairing feature is enabled, enabling code execution, privilege escalation, and denial-of-service conditions. Users are advised to upgrade immediately to mitigate risk.

    Show sources

Information Snippets

  • The arbitrary file-write flaw (CVE-2026-4415) in GIGABYTE Control Center (GCC) is triggered when the 'pairing' feature is enabled on versions 25.07.21.01 or earlier.

    First reported: 01.04.2026 01:28
    1 source, 1 article
    Show sources
  • Exploitation allows unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system, enabling arbitrary code execution, privilege escalation, and denial-of-service conditions.

    First reported: 01.04.2026 01:28
    1 source, 1 article
    Show sources
  • The vulnerability affects all GIGABYTE laptops and motherboards where GCC is pre-installed, including systems with the pairing feature enabled.

    First reported: 01.04.2026 01:28
    1 source, 1 article
    Show sources
  • A patch is available in GCC version 25.12.10.01, addressing download path management, message processing, and command encryption.

    First reported: 01.04.2026 01:28
    1 source, 1 article
    Show sources
  • The flaw was discovered by security researcher David Sprüngli (SilentGrid) and assigned a critical severity rating (CVSS v4.0: 9.2).

    First reported: 01.04.2026 01:28
    1 source, 1 article
    Show sources