CVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
AI Analysis
Technical Summary
CVE-2025-11901 is an improper access control vulnerability (CWE-284) affecting a broad range of ASUS motherboards utilizing Intel chipsets from the B460 through W680 series. The vulnerability arises from insufficient controls over resource consumption and direct memory access (DMA) capabilities via internal expansion slots. An attacker with physical access can install a specially crafted device and accompanying software utility that exploits this flaw to cause uncontrolled resource consumption, which in turn increases the risk of unauthorized DMA. This can lead to bypassing memory protections, potentially exposing sensitive data or allowing system manipulation at a low level. The vulnerability does not require user interaction or prior authentication but does require physical presence to access internal motherboard slots, limiting remote exploitation. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects that while physical access is needed, the impact on confidentiality, integrity, and availability is high. Affected firmware versions are those before 1805, 2002, and 3002, and ASUS has released security advisories recommending firmware updates to address the issue. No known exploits have been reported in the wild yet, but the risk remains significant due to the potential for hardware-level compromise. This vulnerability highlights the importance of securing physical access to critical hardware components and maintaining up-to-date firmware to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-11901 can be substantial, especially in sectors relying heavily on ASUS motherboards with affected Intel chipsets, such as manufacturing, finance, telecommunications, and government infrastructure. Unauthorized DMA access can lead to exposure or modification of sensitive data, undermining confidentiality and integrity. It can also cause system instability or denial of service through resource exhaustion, impacting availability. The requirement for physical access limits the threat to insider attacks or attackers with physical proximity, such as in shared office environments or data centers with insufficient physical security. However, once exploited, the attacker gains a powerful foothold at the hardware level, potentially evading software-based security controls and making detection and remediation more difficult. This could facilitate advanced persistent threats (APTs) or sabotage of critical systems. The broad range of affected ASUS chipsets means many organizations using these motherboards could be vulnerable if firmware is not updated. The lack of known exploits in the wild provides a window for proactive defense, but the high severity necessitates urgent attention.
Mitigation Recommendations
1. Immediately apply the latest UEFI firmware updates from ASUS for all affected motherboard models to remediate the vulnerability. 2. Implement strict physical security controls to prevent unauthorized personnel from accessing internal expansion slots, including locked server racks and restricted access areas. 3. Conduct regular hardware audits to detect any unauthorized devices connected to internal buses or expansion slots. 4. Employ hardware-based intrusion detection mechanisms where possible to alert on tampering or unauthorized hardware additions. 5. Educate IT and security staff about the risks of physical access attacks and the importance of securing hardware components. 6. Integrate firmware integrity verification into routine security assessments to ensure no unauthorized modifications. 7. For high-security environments, consider additional hardware protections such as port blockers or tamper-evident seals on internal slots. 8. Maintain an incident response plan that includes procedures for handling suspected hardware-level compromises. 9. Collaborate with ASUS and monitor security advisories for any further updates or patches related to this vulnerability. 10. Limit the use of affected ASUS motherboards in critical systems where possible, or isolate them within segmented network zones to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Poland, Belgium, Sweden, Switzerland
CVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
Description
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
AI-Powered Analysis
Technical Analysis
CVE-2025-11901 is an improper access control vulnerability (CWE-284) affecting a broad range of ASUS motherboards utilizing Intel chipsets from the B460 through W680 series. The vulnerability arises from insufficient controls over resource consumption and direct memory access (DMA) capabilities via internal expansion slots. An attacker with physical access can install a specially crafted device and accompanying software utility that exploits this flaw to cause uncontrolled resource consumption, which in turn increases the risk of unauthorized DMA. This can lead to bypassing memory protections, potentially exposing sensitive data or allowing system manipulation at a low level. The vulnerability does not require user interaction or prior authentication but does require physical presence to access internal motherboard slots, limiting remote exploitation. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects that while physical access is needed, the impact on confidentiality, integrity, and availability is high. Affected firmware versions are those before 1805, 2002, and 3002, and ASUS has released security advisories recommending firmware updates to address the issue. No known exploits have been reported in the wild yet, but the risk remains significant due to the potential for hardware-level compromise. This vulnerability highlights the importance of securing physical access to critical hardware components and maintaining up-to-date firmware to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-11901 can be substantial, especially in sectors relying heavily on ASUS motherboards with affected Intel chipsets, such as manufacturing, finance, telecommunications, and government infrastructure. Unauthorized DMA access can lead to exposure or modification of sensitive data, undermining confidentiality and integrity. It can also cause system instability or denial of service through resource exhaustion, impacting availability. The requirement for physical access limits the threat to insider attacks or attackers with physical proximity, such as in shared office environments or data centers with insufficient physical security. However, once exploited, the attacker gains a powerful foothold at the hardware level, potentially evading software-based security controls and making detection and remediation more difficult. This could facilitate advanced persistent threats (APTs) or sabotage of critical systems. The broad range of affected ASUS chipsets means many organizations using these motherboards could be vulnerable if firmware is not updated. The lack of known exploits in the wild provides a window for proactive defense, but the high severity necessitates urgent attention.
Mitigation Recommendations
1. Immediately apply the latest UEFI firmware updates from ASUS for all affected motherboard models to remediate the vulnerability. 2. Implement strict physical security controls to prevent unauthorized personnel from accessing internal expansion slots, including locked server racks and restricted access areas. 3. Conduct regular hardware audits to detect any unauthorized devices connected to internal buses or expansion slots. 4. Employ hardware-based intrusion detection mechanisms where possible to alert on tampering or unauthorized hardware additions. 5. Educate IT and security staff about the risks of physical access attacks and the importance of securing hardware components. 6. Integrate firmware integrity verification into routine security assessments to ensure no unauthorized modifications. 7. For high-security environments, consider additional hardware protections such as port blockers or tamper-evident seals on internal slots. 8. Maintain an incident response plan that includes procedures for handling suspected hardware-level compromises. 9. Collaborate with ASUS and monitor security advisories for any further updates or patches related to this vulnerability. 10. Limit the use of affected ASUS motherboards in critical systems where possible, or isolate them within segmented network zones to reduce attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASUS
- Date Reserved
- 2025-10-17T06:47:40.071Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69423560364d4dab9cc00c3b
Added to database: 12/17/2025, 4:45:20 AM
Last enriched: 12/17/2025, 5:00:46 AM
Last updated: 12/17/2025, 6:07:18 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14154: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss
MediumCVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
CriticalCVE-2025-14385: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds WP Recipe Maker
MediumCVE-2025-13880: CWE-862 Missing Authorization in adreastrian WP Social Ninja – Embed Social Feeds, User Reviews & Chat Widgets
MediumCVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.