HomeVulnerabilityASUS DriverHub flaw let malicious websites run instructions with admin rights

ASUS DriverHub flaw let malicious websites run instructions with admin rights

The ASUS DriverHub driver administration utility was susceptible to a essential distant code execution flaw that allowed malicious websites to execute instructions on units with the software program put in.

The flaw was found by an unbiased cybersecurity researcher from New Zealand named Paul (aka “MrBruh”), who discovered that the software program had poor validation of instructions despatched to the DriverHub background service.

This allowed the researcher to create an exploit chain using flaws tracked as CVE-2025-3462 and CVE-2025-3463 that, when mixed, obtain origin bypass and set off distant code execution on the goal.

The DriverHub downside

DriverHub is ASUS’s official driver administration instrument that’s routinely put in on the primary system boot when using sure ASUS motherboards.

This software program runs within the background, routinely detecting and fetching the most recent driver variations for the detected motherboard mannequin and its chipset.

As soon as put in, the instrument stays energetic and working within the background through a neighborhood service on port 53000, regularly checking for necessary driver updates.

See also  Understanding OWASP’s Invoice of Materials Maturity Mannequin: Not all SBOMs are created equal

In the meantime, most customers do not even know such a service is continually working on their system.

That service checks the Origin Header of incoming HTTP requests to reject something that does not come from ‘driverhub.asus.com.’

Nevertheless, this test is poorly carried out, as any web site that features that string is accepted even when it is not an actual match to ASUS’s official portal.

The second problem lies within the UpdateApp endpoint, which permits DriverHub to obtain and run .exe recordsdata from “.asus.com” URLs with out person affirmation.

The BIOS setting concerning DriverHub (Active by default)
The BIOS setting regarding DriverHub (Enabled by default)
Supply: MrBruh

Stealthy assault stream

An attacker can goal any person with ASUS DriverHub working on their system to trick them into visiting a malicious web site on their browser. This web site then sends “UpdateApp requests” to the native service at ‘http://127.0.0.1:53000.’

By spoofing the Origin Header to one thing like ‘driverhub.asus.com.mrbruh.com,’ the weak validation test is bypassed, so DriverHub accepts the instructions.

Within the researcher’s demonstration, the instructions order the software program to obtain a respectable ASUS-signed ‘AsusSetup.exe’ installer from the seller’s obtain portal, together with a malicious .ini file and .exe payload.

See also  Protected Digital Machines Uncovered to New 'CacheWarp' AMD CPU Attack

The ASUS-signed installer is silently run as admin and makes use of the configuration data within the .ini file. This ini file directs the respectable ASUS driver installer to launch the malicious executable file.

The assault can be made doable by the instrument failing to delete recordsdata that fail signature checks, just like the .ini and payload, that are saved on the host after their obtain.

ASUS’ response and person motion

ASUS acquired the researcher’s stories on April 8, 2025, and carried out a repair on April 18, after validating it with MrBruh the day earlier than. The {hardware} big didn’t supply the researcher any bounty for his disclosure.

The CVE descriptions, which the Taiwanese vendor submitted, considerably downplays the difficulty with the next assertion: 

“This problem is proscribed to motherboards and doesn’t have an effect on laptops, desktop computer systems, or different endpoints,” reads the CVE description.

That is complicated, because the talked about CVEs influence laptops and desktop computer systems with DriverHub put in.

See also  Max severity RCE flaw found in broadly used Apache Parquet

Nevertheless, ASUS is clearer in its security bulletin, advising customers to rapidly apply the most recent replace. 

“This replace contains necessary security updates and ASUS strongly recommends that customers replace their ASUS DriverHub set up to the most recent model,” reads the bulletin.

“The most recent Software program Replace could be accessed by opening ASUS DriverHub, then clicking the “Replace Now” button.”

MrBruh says he monitored certificates transparency updates and located no different TLS certificates containing the “driverhub.asus.com” string, indicating it was not exploited within the wild.

If you happen to’re uncomfortable with a background service routinely fetching doubtlessly harmful recordsdata upon visiting web sites, it’s possible you’ll disable DriverHub out of your BIOS settings.

Red Report 2025

Based mostly on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and methods to defend in opposition to them.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular