Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
ASUS Armoury Crate Vulnerability Allows SYSTEM Privilege Escalation

ASUS Armoury Crate Vulnerability Allows SYSTEM Privilege Escalation

by Tekmono Editorial Team
19/06/2025
in News
Share on FacebookShare on Twitter

A critical vulnerability has been discovered in ASUS Armoury Crate, potentially allowing attackers to escalate privileges to SYSTEM level on Windows operating systems, posing a significant threat to users.

The vulnerability, identified as CVE-2025-3464, has been assigned a high severity score of 8.8 out of 10. The flaw resides within the AsIO3.sys driver, a component of the Armoury Crate software suite, which provides a centralized interface for managing ASUS devices, controlling RGB lighting, adjusting fan curves, and downloading updates. The vulnerability allows attackers to bypass authorization mechanisms and gain low-level system privileges.

Marcin “Icewall” Noga, a researcher at Cisco Talos, reported the vulnerability to ASUS. According to Cisco Talos’ advisory, the vulnerability stems from the driver’s improper verification of callers. Instead of using standard OS-level access controls, the driver relies on a hardcoded SHA-256 hash of AsusCertService.exe and a PID allowlist. Exploitation of the vulnerability involves creating a hard link from a benign application to a fake executable. The attacker then launches the application, pauses it, and swaps the hard link to point to AsusCertService.exe. This allows the attacker to bypass authorization and gain access to the driver when the driver checks the file’s SHA-256 hash, because it reads the now-linked trusted binary.

Related Reads

OpenAI Launches Customizable Skills for Codex Coding Agent

Amazon’s Alexa+ to Integrate with Four New Services

EA Investigated for AI-Generated Content in Battlefield 6

Apple to Start iPhone 18 Production in January

Successful exploitation grants the attacker low-level system privileges, providing direct access to physical memory, I/O ports, and model-specific registers (MSRs). This could lead to a complete compromise of the operating system. It is essential to note that attackers need existing system access to exploit CVE-2025-3464, meaning they must already have a foothold on the target system through methods such as malware infection, phishing, or compromised accounts. However, the widespread deployment of Armoury Crate makes it an attractive target.

Cisco Talos validated the vulnerability in Armoury Crate version 5.9.13.0. ASUS has stated that the vulnerability affects versions 5.9.9.0 to 6.1.18.0. The recommended mitigation is to update Armoury Crate to the latest version. Users can update by opening the Armoury Crate app and navigating to “Settings” > “Update Center” > “Check for Updates” > “Update.”

Cisco reported the vulnerability to ASUS in February. Currently, there are no reports of the vulnerability being exploited in the wild. Nevertheless, ASUS strongly advises users to update their Armoury Crate installation to the latest version to protect their systems.

ShareTweet

You Might Be Interested

OpenAI Launches Customizable Skills for Codex Coding Agent
News

OpenAI Launches Customizable Skills for Codex Coding Agent

24/12/2025
Amazon’s Alexa+ to Integrate with Four New Services
News

Amazon’s Alexa+ to Integrate with Four New Services

24/12/2025
EA Investigated for AI-Generated Content in Battlefield 6
News

EA Investigated for AI-Generated Content in Battlefield 6

24/12/2025
Apple to Start iPhone 18 Production in January
News

Apple to Start iPhone 18 Production in January

24/12/2025
Please login to join discussion

Recent Posts

  • OpenAI Launches Customizable Skills for Codex Coding Agent
  • Amazon’s Alexa+ to Integrate with Four New Services
  • EA Investigated for AI-Generated Content in Battlefield 6
  • Apple to Start iPhone 18 Production in January
  • Connect Your Phone to Wi-Fi Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals