Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11775: CWE-125 Out-of-bounds Read in ASUS Armoury Crate

0
Medium
VulnerabilityCVE-2025-11775cvecve-2025-11775cwe-125
Published: Wed Dec 17 2025 (12/17/2025, 04:25:54 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Armoury Crate

Description

An out-of-bounds read vulnerability has been identified in the asComSvc service. This vulnerability can be triggered by sending specially crafted requests, which may lead to a service crash or partial loss of functionality. This vulnerability only affects ASUS motherboard series products. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 12/24/2025, 05:54:44 UTC

Technical Analysis

CVE-2025-11775 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) found in the asComSvc service component of ASUS Armoury Crate software, specifically affecting versions 6.3.4 and earlier. Armoury Crate is a utility primarily used on ASUS motherboards to manage hardware settings and system monitoring. The vulnerability arises when the asComSvc service processes specially crafted requests that cause it to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to a service crash or partial loss of functionality, effectively causing a denial of service condition. The attack vector requires local access with low privileges (PR:L) but does not require user interaction (UI:N) or elevated privileges. The CVSS 4.8 score reflects the limited impact on confidentiality, integrity, and availability, with the main risk being service disruption rather than data compromise or remote code execution. No public exploits have been reported yet, and ASUS has reserved the CVE and published advisories recommending updates. The vulnerability is specific to ASUS motherboard series products running Armoury Crate, which is widely used in gaming and workstation environments. The lack of remote attack vector and requirement for local privilege reduces the attack surface but still poses a risk in environments where attackers can gain local access or execute code with low privileges.

Potential Impact

For European organizations, the primary impact of CVE-2025-11775 is potential denial of service on systems running ASUS motherboards with Armoury Crate software. This could disrupt hardware monitoring and management functions, potentially affecting system stability and performance monitoring. In critical infrastructure or enterprise environments where ASUS hardware is deployed, such service disruptions could delay incident response or system maintenance activities. Although the vulnerability does not allow for privilege escalation or data theft, the loss of Armoury Crate functionality might hinder operational efficiency. Organizations relying on ASUS hardware for workstation or server tasks may experience partial outages or degraded system management capabilities. The medium severity suggests that while the threat is not immediately critical, it should not be ignored, especially in environments with sensitive or high-availability requirements.

Mitigation Recommendations

Organizations should immediately inventory ASUS motherboard deployments and verify the Armoury Crate version installed, prioritizing those running version 6.3.4 or earlier. Since no patch links are currently provided, monitoring ASUS security advisories for official updates is critical. In the interim, restrict local access to systems with Armoury Crate installed to trusted users only, and implement strict endpoint security controls to prevent unauthorized local code execution. Consider disabling or uninstalling Armoury Crate if it is not essential to operations, reducing the attack surface. Employ application whitelisting and privilege management to limit the ability of low-privilege users or malware to interact with the asComSvc service. Additionally, enhance monitoring for service crashes or unusual behaviour related to Armoury Crate to detect potential exploitation attempts. Once patches are released, apply them promptly and validate system stability post-update.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-10-15T03:39:51.860Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69423560364d4dab9cc00c38

Added to database: 12/17/2025, 4:45:20 AM

Last enriched: 12/24/2025, 5:54:44 AM

Last updated: 2/6/2026, 9:40:25 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats