Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine

Posted on June 17, 2025June 17, 2025 By CWS

A vital authorization bypass vulnerability in ASUS Armoury Crate permits attackers to realize system-level privileges on Home windows machines via a complicated onerous hyperlink manipulation approach. 

The vulnerability, tracked as CVE-2025-3464 with a CVSS rating of 8.8, impacts the favored gaming software program’s AsIO3.sys driver and was patched by ASUS on June 16, 2025.

Authentication Bypass By way of Laborious Hyperlink Manipulation

The vulnerability uncovered by Cisco Talos researchers exploits a basic flaw in how the AsIO3.sys driver validates approved purposes. Underneath regular circumstances, the driving force restricts entry to solely the reputable AsusCertService.exe by evaluating SHA-256 hashes of requesting processes. 

The driving force performs this examine utilizing the ZwQueryInformationProcess perform to retrieve the method picture path, then calculates and compares SHA-256 hashes towards a hardcoded worth saved within the world variable g_sha256Hash.

This authentication mechanism might be circumvented utilizing Home windows onerous hyperlinks. The assault includes creating a tough hyperlink that originally factors to a malicious executable, then switching the hyperlink vacation spot to the reputable AsusCertService.exe after the method begins however earlier than the authentication examine happens. 

When the driving force queries the method data, it receives the trail to the onerous hyperlink pointing to the approved ASUS service, successfully bypassing the safety validation.

The exploitation course of includes particular timing manipulation of onerous hyperlinks. Attackers first create a tough hyperlink utilizing the command mklink /h core.exe TestCon2.exe, launch their malicious utility, then swap the hyperlink vacation spot with mklink /h core.exe AsusCertService.exe earlier than the driving force performs its authentication examine. 

This method leverages the Time-of-Test-Time-of-Use (TOCTOU) race situation within the driver’s validation logic.

As soon as authenticated, the compromised utility good points entry to the Asusgio3 system, which exposes vital system functionalities together with mapping arbitrary bodily reminiscence addresses into the digital tackle house of the calling course of, offering entry to I/O port communication directions, and enabling learn/write operations to Mannequin Particular Register (MSR) values. 

These capabilities basically grant attackers kernel-level entry to the system, permitting full system compromise.

Danger FactorsDetailsAffected ProductsASUS Armoury Crate v5.9.13.0 (AsIO3.sys driver)ImpactPrivilege escalationExploit Prerequisites1. Native consumer access2. Laborious hyperlink creation permissions3. Weak driver installedCVSS 3.1 Score8.8 (Excessive)

Patch Obtainable

ASUS responded to the disclosure timeline appropriately, with Cisco Talos reporting the vulnerability on February 18, 2025, adopted by ASUS releasing a patch on June 16, 2025. 

The vulnerability was publicly disclosed the identical day because the patch launch, following accountable disclosure practices. 

The vulnerability impacts ASUS Armoury Crate model 5.9.13.0, and customers are strongly suggested to replace to the newest patched model instantly.

This discovery highlights the continued safety challenges in gaming software program and the significance of correct authorization mechanisms in kernel-level drivers, notably these managing {hardware} entry and system-level operations.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Armoury, ASUS, Attackers, Crate, Escalate, Machine, System, User, Vulnerability, Windows

Post navigation

Previous Post: Circumvent Raises $6 Million for Cloud Security Platform
Next Post: US Insurance Industry Warned of Scattered Spider Attacks

Related Posts

Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware Cyber Security News
US to Offer $10 Million Reward for Details About RedLine Malware Developer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News