CVE-2026-3428

Published: Apr 16, 2026 Last Modified: Apr 16, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,4
Source: 54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Center(华硕大厅) allows a local user to achieve privilege escalation to Administrator via exploitation of a Time-of-check Time-of-use (TOC-TOU) during the update process, where an unexpected payload is substituted for a legitimate one immediately after download, and subsequently executed with administrative privileges upon user consent.
Refer to the 'Security Update for ASUS Member Center' section on the ASUS Security Advisory for more information.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0000
Percentile
0,0th
Updated

Single Data Point

Only one EPSS measurement is available for this CVE. Trend analysis requires multiple data points over time.

367

Time-of-check Time-of-use (TOCTOU) Race Condition

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Other Non-Repudiation
Potential Impacts:
Alter Execution Logic Unexpected State Modify Application Data Modify Files Or Directories Modify Memory Other Hide Activities
Applicable Platforms
All platforms may be affected
View CWE Details
494

Download of Code Without Integrity Check

Draft
Common Consequences
Security Scopes Affected:
Integrity Availability Confidentiality Other
Potential Impacts:
Execute Unauthorized Code Or Commands Alter Execution Logic Other
Applicable Platforms
All platforms may be affected
View CWE Details
https://www.asus.com/security-advisory/