• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

ASUS Patches DriverHub RCE Flaws Exploitable through HTTP and Crafted .ini Information

Admin by Admin
May 13, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Could 12, 2025Ravie LakshmananVulnerability / Endpoint Safety

ASUS Patches DriverHub RCE Flaws

ASUS has launched updates to deal with two safety flaws impacting ASUS DriverHub that, if efficiently exploited, might allow an attacker to leverage the software program as a way to obtain distant code execution.

DriverHub is a software that is designed to robotically detect the motherboard mannequin of a pc and show crucial driver updates for subsequent set up by speaking with a devoted website hosted at “driverhub.asus[.]com.”

The issues recognized within the software program are listed beneath –

  • CVE-2025-3462 (CVSS rating: 8.4) – An origin validation error vulnerability that will permit unauthorized sources to work together with the software program’s options through crafted HTTP requests
  • CVE-2025-3463 (CVSS rating: 9.4) – An improper certificates validation vulnerability that will permit untrusted sources to have an effect on system conduct through crafted HTTP requests

Safety researcher MrBruh, who’s credited with discovering and reporting the 2 vulnerabilities, stated they might be exploited to attain distant code execution as a part of a one-click assault.

Cybersecurity

The assault chain basically includes tricking an unsuspecting consumer into visiting a sub-domain of driverhub.asus[.]com (e.g., driverhub.asus.com..com) after which leveraging the DriverHub’s UpdateApp endpoint to execute a respectable model of the “AsusSetup.exe” binary with an possibility set to run any file hosted on the pretend area.

“When executing AsusSetup.exe it first reads from AsusSetup.ini, which incorporates metadata in regards to the driver,” the researcher defined in a technical report.

“Should you run AsusSetup.exe with the -s flag (DriverHub calls it utilizing this to do a silent set up), it’s going to execute no matter is laid out in SilentInstallRun. On this case, the ini file specifies a cmd script that performs an automatic headless set up of the motive force, but it surely might run something.”

All an attacker must efficiently pull off the exploit is to create a site, and host three information, the malicious payload to be run, an altered model of AsusSetup.ini that has the “SilentInstallRun” property set to the malicious binary, and AsusSetup.exe, which then make use of the property to run the payload.

Following accountable disclosure on April 8, 2025, the problems had been fastened by ASUS on Could 9. There is no such thing as a proof that the vulnerabilities have been exploited within the wild.

“This replace consists of vital safety updates and ASUS strongly recommends that customers replace their ASUS DriverHub set up to the most recent model,” the corporate stated in a bulletin. “The most recent Software program Replace may be accessed by opening ASUS DriverHub, then clicking the ‘Replace Now’ button.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.



Tags: .iniASUSCraftedDriverHubExploitableFilesFlawsHTTPPatchesRCE
Admin

Admin

Next Post
What Can You Do with a Free Semrush Account?

What Can You Do with a Free Semrush Account?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Samsung Teases Extremely-Grade Foldable Cellphone With a ‘Highly effective Digital camera,’ AI Instruments

Samsung Teases Extremely-Grade Foldable Cellphone With a ‘Highly effective Digital camera,’ AI Instruments

June 4, 2025
How we’re supporting higher tropical cyclone prediction with AI

How we’re supporting higher tropical cyclone prediction with AI

June 16, 2025

Trending.

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos Information

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos Information

April 10, 2025
Expedition 33 Guides, Codex, and Construct Planner

Expedition 33 Guides, Codex, and Construct Planner

April 26, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

April 28, 2025
Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi

Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi

May 5, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Yoast AI Optimize now out there for Basic Editor • Yoast

Replace on Yoast AI Optimize for Traditional Editor  • Yoast

June 18, 2025
You’ll at all times keep in mind this because the day you lastly caught FamousSparrow

You’ll at all times keep in mind this because the day you lastly caught FamousSparrow

June 18, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved