A high-severity authorization bypass vulnerability (CVE-2025-3464) has been identified in ASUS Armoury Crate 5.9.13.0, exposing Windows systems to potential privilege escalation attacks.
The flaw resides in the AsIO3.sys driver, which manages hardware communication for ASUS peripherals and components, and carries a CVSSv3 score of 8.81.
Cybersecurity firm Talos disclosed the vulnerability on June 16, 2025, following coordinated disclosure with ASUS.
The vulnerability stems from improper authorization checks in the AsIO3.sys driver’s IRP_MJ_CREATE handler.
The driver implements a custom security mechanism that only allows processes with specific SHA-256 hashes (e.g., c5c176fc0cbf4cc4e37c84b6237392b8bea58dbccf5fbbc902819dfc72ca9efa for AsusCertService.exe) or whitelisted process IDs to access the DeviceAsusgio3 interface.
Attackers bypass this protection using a hard link manipulation technique:
core.exe) pointing to a malicious executableZwQueryInformationProcess call (lines 22-27)This tricks the driver into validating the legitimate ASUS binary while executing attacker-controlled code.
The PoC code below demonstrates the critical file-swapping logic:
powershellmklink /h core.exe TestCon2.exe # Create initial hard link
.core.exe # Execute malicious payload
del core.exe # Remove link
mklink /h core.exe AsusCertService.exe # Re-link to legitimate binary
Successful exploitation provides attackers with direct hardware access through the compromised driver, enabling:
ZwMapViewOfSection__inbyte/__outbyte instructionsrdmsr/wrmsr)| Risk Factor | Technical Details |
|---|---|
| Attack Vector | Local (AV:L) – Requires execution |
| Privilege Requirement | Low (PR:L) – User-level access sufficient |
| Impact Scope | System Confidentiality/Integrity (C:H/I:H) |
| CVSSv3 | 8.8 (High) |
| Patch Status | Fixed in Armoury Crate ≥5.9.13.1 |
ASUS released patches on June 16, 2025, and users should immediately update through the Armoury Crate interface or manual download.
Organizations should:
This vulnerability highlights systemic risks in vendor-specific driver architectures.
The AsIO3.sys implementation demonstrates three critical failures:
Security researchers emphasize that such design patterns enable “living off the land” attacks, where malicious actors exploit legitimate drivers to bypass endpoint detection systems.
The Talos disclosure follows similar findings in 2024 affecting other OEM utilities, underscoring the need for stricter driver certification processes.
ASUS has not disclosed whether the vulnerability affected other product lines, but security teams recommend reviewing all ASUS software utilities for similar authorization flaws.
The company’s rapid patch deployment (118-day turnaround from disclosure) sets a positive precedent for OEM vulnerability response.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post ASUS Armoury Crate Vulnerability Allows Attackers to Escalate to System User on Windows appeared first on Cyber Security News.
A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls…
Amy Guimond, who grew up in Henniker, moved back to town a few years ago…
Town officials in Pembroke have learned from past mistakes. This year, when the wireless microphone…
A long-vacant house on Airport Road sustained major damage in a fire early Saturday morning.…
Amy Bogart has had enough of the state failing to adequately fund education programs, such…
By the time Kelly Bokhan came to Loudon’s town meeting, she felt her wallet was…
This website uses cookies.