Description
A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Center(华硕大厅) allows a local user to achieve privilege escalation to Administrator via exploitation of a Time-of-check Time-of-use (TOC-TOU) during the update process, where an unexpected payload is substituted for a legitimate one immediately after download, and subsequently executed with administrative privileges upon user consent.
Refer to the 'Security Update for ASUS Member Center' section on the ASUS Security Advisory for more information.
Published: 2026-04-16
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Administrator
Action: Patch Now
AI Analysis

Impact

A vulnerability in the ASUS Member Center update modules allows a local user to replace a legitimate firmware component with a malicious payload immediately after download, exploiting a Time‑of‑check Time‑of‑use condition. The replacement is executed with administrator privileges following the user’s consent, giving the attacker control over the system. The flaw is a download of code without integrity checking, mapping to CWE‑367 and CWE‑494.

Affected Systems

The affected product is ASUS Member Center (华硕大厅). No specific version information is supplied; the issue applies to installations of the update modules that perform unchecked download and execution of update files.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. EPSS is not available, and the vulnerability is not listed in KEV, suggesting no known exploits in the wild yet. Exploitation requires a local user with permission to trigger an update and to give consent, making it a local privilege escalation scenario. If the vulnerability remains unpatched, an attacker could execute arbitrary code with administrative privileges on the affected system.

Generated by OpenCVE AI on April 16, 2026 at 09:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the security update for ASUS Member Center from the official ASUS Security Advisory.
  • Verify the integrity of the update package by checking the publisher’s digital signature or checksum before installation.
  • Configure the system to reject unsigned or altered update files, and consider disabling automatic updates for this application until the issue is fully addressed.

Generated by OpenCVE AI on April 16, 2026 at 09:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Unverified Update Payload in ASUS Member Center
First Time appeared Asus
Asus member Center
Vendors & Products Asus
Asus member Center

Thu, 16 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Description A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Center(华硕大厅) allows a local user to achieve privilege escalation to Administrator via exploitation of a Time-of-check Time-of-use (TOC-TOU) during the update process, where an unexpected payload is substituted for a legitimate one immediately after download, and subsequently executed with administrative privileges upon user consent. Refer to the 'Security Update for ASUS Member Center' section on the ASUS Security Advisory for more information.
Weaknesses CWE-367
CWE-494
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Asus Member Center
cve-icon MITRE

Status: PUBLISHED

Assigner: ASUS

Published:

Updated: 2026-04-16T12:31:27.657Z

Reserved: 2026-03-02T09:30:08.780Z

Link: CVE-2026-3428

cve-icon Vulnrichment

Updated: 2026-04-16T12:22:13.851Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-16T03:16:26.937

Modified: 2026-04-17T15:17:00.957

Link: CVE-2026-3428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:15:30Z

Weaknesses