Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine

ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine

Posted on June 17, 2025June 17, 2025 By CWS

A vital authorization bypass vulnerability in ASUS Armoury Crate permits attackers to realize system-level privileges on Home windows machines via a complicated onerous hyperlink manipulation approach. 

The vulnerability, tracked as CVE-2025-3464 with a CVSS rating of 8.8, impacts the favored gaming software program’s AsIO3.sys driver and was patched by ASUS on June 16, 2025.

Authentication Bypass By way of Laborious Hyperlink Manipulation

The vulnerability uncovered by Cisco Talos researchers exploits a basic flaw in how the AsIO3.sys driver validates approved purposes. Underneath regular circumstances, the driving force restricts entry to solely the reputable AsusCertService.exe by evaluating SHA-256 hashes of requesting processes. 

The driving force performs this examine utilizing the ZwQueryInformationProcess perform to retrieve the method picture path, then calculates and compares SHA-256 hashes towards a hardcoded worth saved within the world variable g_sha256Hash.

This authentication mechanism might be circumvented utilizing Home windows onerous hyperlinks. The assault includes creating a tough hyperlink that originally factors to a malicious executable, then switching the hyperlink vacation spot to the reputable AsusCertService.exe after the method begins however earlier than the authentication examine happens. 

When the driving force queries the method data, it receives the trail to the onerous hyperlink pointing to the approved ASUS service, successfully bypassing the safety validation.

The exploitation course of includes particular timing manipulation of onerous hyperlinks. Attackers first create a tough hyperlink utilizing the command mklink /h core.exe TestCon2.exe, launch their malicious utility, then swap the hyperlink vacation spot with mklink /h core.exe AsusCertService.exe earlier than the driving force performs its authentication examine. 

This method leverages the Time-of-Test-Time-of-Use (TOCTOU) race situation within the driver’s validation logic.

As soon as authenticated, the compromised utility good points entry to the Asusgio3 system, which exposes vital system functionalities together with mapping arbitrary bodily reminiscence addresses into the digital tackle house of the calling course of, offering entry to I/O port communication directions, and enabling learn/write operations to Mannequin Particular Register (MSR) values. 

These capabilities basically grant attackers kernel-level entry to the system, permitting full system compromise.

Danger FactorsDetailsAffected ProductsASUS Armoury Crate v5.9.13.0 (AsIO3.sys driver)ImpactPrivilege escalationExploit Prerequisites1. Native consumer access2. Laborious hyperlink creation permissions3. Weak driver installedCVSS 3.1 Score8.8 (Excessive)

Patch Obtainable

ASUS responded to the disclosure timeline appropriately, with Cisco Talos reporting the vulnerability on February 18, 2025, adopted by ASUS releasing a patch on June 16, 2025. 

The vulnerability was publicly disclosed the identical day because the patch launch, following accountable disclosure practices. 

The vulnerability impacts ASUS Armoury Crate model 5.9.13.0, and customers are strongly suggested to replace to the newest patched model instantly.

This discovery highlights the continued safety challenges in gaming software program and the significance of correct authorization mechanisms in kernel-level drivers, notably these managing {hardware} entry and system-level operations.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Armoury, ASUS, Attackers, Crate, Escalate, Machine, System, User, Vulnerability, Windows

Post navigation

Previous Post: Circumvent Raises $6 Million for Cloud Security Platform
Next Post: US Insurance Industry Warned of Scattered Spider Attacks

Related Posts

New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Cyber Security News
New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls Cyber Security News
Enhancing Nmap Efficiency with nmapUnleashed Enhancing Nmap Efficiency with nmapUnleashed Cyber Security News
AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization Cyber Security News
CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News