Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine

Posted on June 17, 2025June 17, 2025 By CWS

A vital authorization bypass vulnerability in ASUS Armoury Crate permits attackers to realize system-level privileges on Home windows machines via a complicated onerous hyperlink manipulation approach. 

The vulnerability, tracked as CVE-2025-3464 with a CVSS rating of 8.8, impacts the favored gaming software program’s AsIO3.sys driver and was patched by ASUS on June 16, 2025.

Authentication Bypass By way of Laborious Hyperlink Manipulation

The vulnerability uncovered by Cisco Talos researchers exploits a basic flaw in how the AsIO3.sys driver validates approved purposes. Underneath regular circumstances, the driving force restricts entry to solely the reputable AsusCertService.exe by evaluating SHA-256 hashes of requesting processes. 

The driving force performs this examine utilizing the ZwQueryInformationProcess perform to retrieve the method picture path, then calculates and compares SHA-256 hashes towards a hardcoded worth saved within the world variable g_sha256Hash.

This authentication mechanism might be circumvented utilizing Home windows onerous hyperlinks. The assault includes creating a tough hyperlink that originally factors to a malicious executable, then switching the hyperlink vacation spot to the reputable AsusCertService.exe after the method begins however earlier than the authentication examine happens. 

When the driving force queries the method data, it receives the trail to the onerous hyperlink pointing to the approved ASUS service, successfully bypassing the safety validation.

The exploitation course of includes particular timing manipulation of onerous hyperlinks. Attackers first create a tough hyperlink utilizing the command mklink /h core.exe TestCon2.exe, launch their malicious utility, then swap the hyperlink vacation spot with mklink /h core.exe AsusCertService.exe earlier than the driving force performs its authentication examine. 

This method leverages the Time-of-Test-Time-of-Use (TOCTOU) race situation within the driver’s validation logic.

As soon as authenticated, the compromised utility good points entry to the Asusgio3 system, which exposes vital system functionalities together with mapping arbitrary bodily reminiscence addresses into the digital tackle house of the calling course of, offering entry to I/O port communication directions, and enabling learn/write operations to Mannequin Particular Register (MSR) values. 

These capabilities basically grant attackers kernel-level entry to the system, permitting full system compromise.

Danger FactorsDetailsAffected ProductsASUS Armoury Crate v5.9.13.0 (AsIO3.sys driver)ImpactPrivilege escalationExploit Prerequisites1. Native consumer access2. Laborious hyperlink creation permissions3. Weak driver installedCVSS 3.1 Score8.8 (Excessive)

Patch Obtainable

ASUS responded to the disclosure timeline appropriately, with Cisco Talos reporting the vulnerability on February 18, 2025, adopted by ASUS releasing a patch on June 16, 2025. 

The vulnerability was publicly disclosed the identical day because the patch launch, following accountable disclosure practices. 

The vulnerability impacts ASUS Armoury Crate model 5.9.13.0, and customers are strongly suggested to replace to the newest patched model instantly.

This discovery highlights the continued safety challenges in gaming software program and the significance of correct authorization mechanisms in kernel-level drivers, notably these managing {hardware} entry and system-level operations.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Armoury, ASUS, Attackers, Crate, Escalate, Machine, System, User, Vulnerability, Windows

Post navigation

Previous Post: Circumvent Raises $6 Million for Cloud Security Platform
Next Post: US Insurance Industry Warned of Scattered Spider Attacks

Related Posts

Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Cyber Security News
XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News