A key Asus Windows tool has a worrying security flaw – here’s how to stay safe




  • Asus released a patch for CVE-2025-3464, a high-severity authentication bypass flaw
  • The issue affects Armoury Crate, a centralized hub for managing ASUS and ROG hardware
  • The flaw could possibly lead to full device takeover

Asus says it has fixed a high-severity vulnerability that could have allowed threat actors to bypass authentication requirements and obtain SYSTEM privileges on a Windows device.

Recently, a security researcher from Cisco Talos discovered an Armoury Crate kernel-mode driver doesn’t rely on proper OS-level checks, but instead authenticates requests using a hardcoded SHA-256 hash of AsusCertServices.exe and a PID allowlist.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *