An important Asus Windows tool has a worrying security error – here is how you can stay safe
- Advertisement -
- Advertisement -
- ASUS has released a patch for CVE-2025-3464, a very serious authentication bypass error
- The problem affects Armory Crate, a centralized hub for managing Asus and Rog -hardware
- The error may lead to a complete takeover of the device
ASUS says that it has established a vulnerability with a high seriousness that could have enabled threat factors to bypass authentication requirements and obtain system rights on a Windows device.
Recently a Cisco Talos security researcher discovered that an arsenal Krat Kernel-Mode driver is not dependent on the correct checks at the OS level, but instead request authenticating with the help of a hardcode SA-256 hash from Asuscertservices.exe and a PID permit.
This means that a threat actor can make a hard link from a benign -executive file to a placeholder file, the app can start and then change the link to point to the familiar Asus Binary. When the driver verifies the hash, it will recognize a trusted signature, although the process of the attacker now uses that context.
Solved with updates
The end result is unauthorized access to the driver, which can lead to a full compromise of the device. The good news is that the threat actor to abuse this vulnerability must gain access to system access in advance (either through stolen/purchased references, or a back door).
The vulnerability was found in Armory Crate, an Asus application that is usually installed in advance on rog and tuf laptops and desktops.
It serves as a centralized hub for managing Asus and Rog -hardware, including RGB lighting, fan curves and the performance of different peripherals -and can also be used to manage drivers and firmware updates.
The issue is now followed as CVE-2025-3464 and has a serious score of 8.4/10 (high), according to NVD.
All versions between 5.9.9.0 and 6.1.18.0 would be vulnerable and to secure their devices, users must update to the latest version of Armory Crate: that can be done by navigating to Settings> Update Center> Check for updates> Update.
Asus said it was not evidence that the error in the wild is being abused, but still “highly recommend” users update their installations as quickly as possible.
Maybe you like it too
- Advertisement -