13.3 C
Canberra
Saturday, December 13, 2025

ASUS Patches DriverHub RCE Flaws Exploitable through HTTP and Crafted .ini Information


Might 12, 2025Ravie LakshmananVulnerability / Endpoint Safety

ASUS Patches DriverHub RCE Flaws Exploitable through HTTP and Crafted .ini Information

ASUS has launched updates to handle two safety flaws impacting ASUS DriverHub that, if efficiently exploited, might allow an attacker to leverage the software program with the intention to obtain distant code execution.

DriverHub is a software that is designed to robotically detect the motherboard mannequin of a pc and show mandatory driver updates for subsequent set up by speaking with a devoted website hosted at “driverhub.asus[.]com.”

The failings recognized within the software program are listed under –

  • CVE-2025-3462 (CVSS rating: 8.4) – An origin validation error vulnerability which will permit unauthorized sources to work together with the software program’s options through crafted HTTP requests
  • CVE-2025-3463 (CVSS rating: 9.4) – An improper certificates validation vulnerability which will permit untrusted sources to have an effect on system habits through crafted HTTP requests

Safety researcher MrBruh, who’s credited with discovering and reporting the 2 vulnerabilities, mentioned they might be exploited to realize distant code execution as a part of a one-click assault.

Cybersecurity

The assault chain primarily includes tricking an unsuspecting person into visiting a sub-domain of driverhub.asus[.]com (e.g., driverhub.asus.com..com) after which leveraging the DriverHub’s UpdateApp endpoint to execute a reliable model of the “AsusSetup.exe” binary with an possibility set to run any file hosted on the pretend area.

“When executing AsusSetup.exe it first reads from AsusSetup.ini, which comprises metadata in regards to the driver,” the researcher defined in a technical report.

“For those who run AsusSetup.exe with the -s flag (DriverHub calls it utilizing this to do a silent set up), it is going to execute no matter is laid out in SilentInstallRun. On this case, the ini file specifies a cmd script that performs an automatic headless set up of the driving force, but it surely might run something.”

All an attacker must efficiently pull off the exploit is to create a website, and host three recordsdata, the malicious payload to be run, an altered model of AsusSetup.ini that has the “SilentInstallRun” property set to the malicious binary, and AsusSetup.exe, which then make use of the property to run the payload.

Following accountable disclosure on April 8, 2025, the problems had been fastened by ASUS on Might 9. There isn’t a proof that the vulnerabilities have been exploited within the wild.

“This replace contains vital safety updates and ASUS strongly recommends that customers replace their ASUS DriverHub set up to the newest model,” the corporate mentioned in a bulletin. “The most recent Software program Replace may be accessed by opening ASUS DriverHub, then clicking the ‘Replace Now’ button.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles