Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

Posted on May 12, 2025May 12, 2025 By CWS

Could 12, 2025Ravie LakshmananVulnerability / Endpoint Safety
ASUS has launched updates to deal with two safety flaws impacting ASUS DriverHub that, if efficiently exploited, might allow an attacker to leverage the software program with a purpose to obtain distant code execution.
DriverHub is a device that is designed to mechanically detect the motherboard mannequin of a pc and show crucial driver updates for subsequent set up by speaking with a devoted web site hosted at “driverhub.asus[.]com.”
The failings recognized within the software program are listed under –

CVE-2025-3462 (CVSS rating: 8.4) – An origin validation error vulnerability which will enable unauthorized sources to work together with the software program’s options through crafted HTTP requests
CVE-2025-3463 (CVSS rating: 9.4) – An improper certificates validation vulnerability which will enable untrusted sources to have an effect on system habits through crafted HTTP requests

Safety researcher MrBruh, who’s credited with discovering and reporting the 2 vulnerabilities, mentioned they could possibly be exploited to realize distant code execution as a part of a one-click assault.

The assault chain primarily entails tricking an unsuspecting person into visiting a sub-domain of driverhub.asus[.]com (e.g., driverhub.asus.com.<random string>.com) after which leveraging the DriverHub’s UpdateApp endpoint to execute a professional model of the “AsusSetup.exe” binary with an possibility set to run any file hosted on the pretend area.
“When executing AsusSetup.exe it first reads from AsusSetup.ini, which comprises metadata in regards to the driver,” the researcher defined in a technical report.
“For those who run AsusSetup.exe with the -s flag (DriverHub calls it utilizing this to do a silent set up), it’s going to execute no matter is laid out in SilentInstallRun. On this case, the ini file specifies a cmd script that performs an automatic headless set up of the driving force, however it might run something.”
All an attacker must efficiently pull off the exploit is to create a site, and host three information, the malicious payload to be run, an altered model of AsusSetup.ini that has the “SilentInstallRun” property set to the malicious binary, and AsusSetup.exe, which then make use of the property to run the payload.
Following accountable disclosure on April 8, 2025, the problems have been fastened by ASUS on Could 9. There isn’t any proof that the vulnerabilities have been exploited within the wild.
“This replace contains necessary safety updates and ASUS strongly recommends that customers replace their ASUS DriverHub set up to the newest model,” the corporate mentioned in a bulletin. “The newest Software program Replace could be accessed by opening ASUS DriverHub, then clicking the ‘Replace Now’ button.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:.ini, ASUS, Crafted, DriverHub, Exploitable, Files, Flaws, HTTP, Patches, RCE

Post navigation

Previous Post: Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits
Next Post: Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack

Related Posts

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups The Hacker News
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts The Hacker News
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data The Hacker News
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures The Hacker News
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News