Description
An Exposed IOCTL with Insufficient Access Control vulnerability in AsusPTPFilter allows a local user to bypass driver security mechanisms and obtain restricted touchpad information or render the touchpad unusable via crafted IOCTL requests.Refer to the '
Security Update for ASUS Precision Touchpad ' section on the ASUS Security Advisory for more information.
Published: 2026-05-08
Score: 2 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an exposed IOCTL interface in the AsusPTPFilter driver that is protected by insufficient access control. The flaw allows a user with local access to craft specific IOCTL requests and exercise privileged operations that were intended to be limited. By doing so, the attacker can read internal touchpad state data that should be protected and can issue commands that disable the touchpad, effectively causing a denial of service to the user. The underlying weakness corresponds to CWE‑782, which involves improper restriction of information flows.

Affected Systems

The affected product is the AsusPTPFilter driver found in ASUS Precision Touchpad devices. Vendor: ASUS; product: AsusPTPFilter. No specific version numbers are publicly listed in the advisory, so any installed instance of the driver should be considered vulnerable until a fix is applied.

Risk and Exploitability

The reported CVSS score of 2.0 indicates a low overall severity. EPSS is not available, and the vulnerability is not yet listed in CISA’s KEV catalog, suggesting it is not currently widely exploited in the wild. Based on the description, the likely attack vector is local; an attacker would need physical or local system access to trigger the vulnerability. If such privilege is available, the attacker can bypass driver security checks and access protected touchpad data or render the touchpad unusable. The low CVSS and lack of exploitation evidence reduce the immediate urgency, but disabling the driver or applying a vendor patch is recommended to mitigate the local risk.

Generated by OpenCVE AI on May 8, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AsusPTPFilter driver to the patch released in the ASUS Security Advisory for the Precision Touchpad.
  • If a patched version is not yet available, disable or uninstall the AsusPTPFilter driver to eliminate the exposed IOCTL interface.
  • Monitor ASUS security advisories and keep the system’s firmware and operating system components up to date as additional mitigations may be released.

Generated by OpenCVE AI on May 8, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 08 May 2026 03:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Unsane IOCTL in AsusPTPFilter Driver

Fri, 08 May 2026 02:45:00 +0000

Type Values Removed Values Added
Description An Exposed IOCTL with Insufficient Access Control vulnerability in AsusPTPFilter allows a local user to bypass driver security mechanisms and obtain restricted touchpad information or render the touchpad unusable via crafted IOCTL requests.Refer to the ' Security Update for ASUS Precision Touchpad ' section on the ASUS Security Advisory for more information.
First Time appeared Asus
Asus asusptpfilter
Weaknesses CWE-782
CPEs cpe:2.3:a:asus:asusptpfilter:*:*:*:*:*:*:*:*
Vendors & Products Asus
Asus asusptpfilter
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Asus Asusptpfilter
cve-icon MITRE

Status: PUBLISHED

Assigner: ASUS

Published:

Updated: 2026-05-08T02:00:26.422Z

Reserved: 2026-04-21T06:25:50.061Z

Link: CVE-2026-6737

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T03:16:24.990

Modified: 2026-05-08T03:16:24.990

Link: CVE-2026-6737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T03:30:44Z

Weaknesses