INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 9h Global ransomware Financial Services / Cybersecurity CRITICAL 9h Global vulnerability Information Technology / Cybersecurity CRITICAL 11h Global malware Energy and Utilities CRITICAL 12h Global ransomware Multiple sectors CRITICAL 12h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 15h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 15h Global phishing Multiple sectors HIGH 15h Global insider Cybersecurity Services CRITICAL 16h Global ransomware Multiple sectors (U.S. companies) CRITICAL 16h Global data_breach Government CRITICAL 9h Global ransomware Financial Services / Cybersecurity CRITICAL 9h Global vulnerability Information Technology / Cybersecurity CRITICAL 11h Global malware Energy and Utilities CRITICAL 12h Global ransomware Multiple sectors CRITICAL 12h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 15h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 15h Global phishing Multiple sectors HIGH 15h Global insider Cybersecurity Services CRITICAL 16h Global ransomware Multiple sectors (U.S. companies) CRITICAL 16h Global data_breach Government CRITICAL 9h Global ransomware Financial Services / Cybersecurity CRITICAL 9h Global vulnerability Information Technology / Cybersecurity CRITICAL 11h Global malware Energy and Utilities CRITICAL 12h Global ransomware Multiple sectors CRITICAL 12h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 15h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 15h Global phishing Multiple sectors HIGH 15h Global insider Cybersecurity Services CRITICAL 16h Global ransomware Multiple sectors (U.S. companies) CRITICAL 16h
Vulnerabilities

CVE-2018-19320

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
GIGABYTE Multiple Products Unspecified Vulnerability — The GDrv low-level driver in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II exposes ring0 memcpy-like functiona
Published: Oct 24, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

GIGABYTE Multiple Products Unspecified Vulnerability — The GDrv low-level driver in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.

🤖 AI Executive Summary

CVE-2018-19320 is a critical vulnerability in GIGABYTE's GDrv low-level driver (used in App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II) that exposes ring0 memcpy-like functionality to local attackers. This allows complete system takeover by enabling arbitrary kernel memory read/write operations. Public exploits are available, and this driver has been actively abused in Bring Your Own Vulnerable Driver (BYOVD) attacks by threat actors including ransomware groups. The vulnerability is particularly dangerous as the signed driver can be loaded even on systems where the GIGABYTE software is not installed.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 10, 2026 15:43
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations across multiple sectors. Government entities (NCA-regulated), banking institutions (SAMA-regulated), and energy sector companies (including ARAMCO and its contractors) that use GIGABYTE hardware with bundled software are directly affected. The BYOVD attack vector means even organizations without GIGABYTE software installed could be targeted — threat actors can bring the vulnerable signed driver to any Windows system. Saudi SOCs should be particularly concerned as this technique has been used by advanced ransomware operators and APT groups targeting critical infrastructure in the Middle East. Telecom operators (STC, Mobily, Zain) and healthcare organizations with workstations using GIGABYTE motherboards are also at risk.
🏢 Affected Saudi Sectors
Government Banking Energy Telecom Healthcare Defense Education
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Inventory all systems with GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, or OC GURU II installed
2. Update all GIGABYTE software to the latest patched versions from the official GIGABYTE website
3. Remove the vulnerable GDrv driver (gdrv.sys) from all systems where it is not needed

BYOVD Mitigation:
4. Enable Windows Defender Application Control (WDAC) or deploy Microsoft's Vulnerable Driver Blocklist to prevent loading of the known-vulnerable signed driver
5. Enable Hypervisor-Protected Code Integrity (HVCI) on supported systems
6. Add the vulnerable driver hash to your endpoint protection blocklist

Detection Rules:
7. Monitor for loading of gdrv.sys driver (Sysmon Event ID 6) — hash: 31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427
8. Create SIEM alerts for DeviceIoControl calls to \\.\GDrv device
9. Monitor for suspicious driver loading by non-administrative processes
10. Deploy YARA rules for known BYOVD toolkits that leverage this driver
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. جرد جميع الأنظمة المثبت عليها GIGABYTE App Center أو AORUS Graphics Engine أو XTREME Gaming Engine أو OC GURU II
2. تحديث جميع برامج GIGABYTE إلى أحدث الإصدارات المصححة من موقع GIGABYTE الرسمي
3. إزالة برنامج تشغيل GDrv الضعيف (gdrv.sys) من جميع الأنظمة التي لا تحتاجه

تخفيف هجمات BYOVD:
4. تفعيل Windows Defender Application Control (WDAC) أو نشر قائمة حظر برامج التشغيل الضعيفة من Microsoft
5. تفعيل Hypervisor-Protected Code Integrity (HVCI) على الأنظمة المدعومة
6. إضافة تجزئة برنامج التشغيل الضعيف إلى قائمة الحظر في حماية نقاط النهاية

قواعد الكشف:
7. مراقبة تحميل برنامج تشغيل gdrv.sys (Sysmon Event ID 6)
8. إنشاء تنبيهات SIEM لاستدعاءات DeviceIoControl إلى جهاز GDrv
9. مراقبة تحميل برامج التشغيل المشبوهة من قبل العمليات غير الإدارية
10. نشر قواعد YARA لأدوات BYOVD المعروفة التي تستغل هذا البرنامج
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Asset Management) ECC-2:5-1 (Vulnerability Management) ECC-2:4-2 (Secure Configuration) ECC-2:6-1 (Threat Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.4.1 (Endpoint Security) 3.3.4 (Secure Configuration)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.7 (Protection against malware) A.8.15 (Logging)
🟣 PCI DSS v4.0
6.3.3 (Patching security vulnerabilities) 5.2 (Anti-malware mechanisms) 11.5 (File integrity monitoring)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
GIGABYTE:Multiple Products
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS37.07%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-11-14
Published 2022-10-24
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.