Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series

0
High
VulnerabilityCVE-2025-11901cvecve-2025-11901cwe-284
Published: Wed Dec 17 2025 (12/17/2025, 04:23:51 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: B460 series

Description

An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 12/17/2025, 05:00:46 UTC

Technical Analysis

CVE-2025-11901 is an improper access control vulnerability (CWE-284) affecting a broad range of ASUS motherboards utilizing Intel chipsets from the B460 through W680 series. The vulnerability arises from insufficient controls over resource consumption and direct memory access (DMA) capabilities via internal expansion slots. An attacker with physical access can install a specially crafted device and accompanying software utility that exploits this flaw to cause uncontrolled resource consumption, which in turn increases the risk of unauthorized DMA. This can lead to bypassing memory protections, potentially exposing sensitive data or allowing system manipulation at a low level. The vulnerability does not require user interaction or prior authentication but does require physical presence to access internal motherboard slots, limiting remote exploitation. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects that while physical access is needed, the impact on confidentiality, integrity, and availability is high. Affected firmware versions are those before 1805, 2002, and 3002, and ASUS has released security advisories recommending firmware updates to address the issue. No known exploits have been reported in the wild yet, but the risk remains significant due to the potential for hardware-level compromise. This vulnerability highlights the importance of securing physical access to critical hardware components and maintaining up-to-date firmware to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-11901 can be substantial, especially in sectors relying heavily on ASUS motherboards with affected Intel chipsets, such as manufacturing, finance, telecommunications, and government infrastructure. Unauthorized DMA access can lead to exposure or modification of sensitive data, undermining confidentiality and integrity. It can also cause system instability or denial of service through resource exhaustion, impacting availability. The requirement for physical access limits the threat to insider attacks or attackers with physical proximity, such as in shared office environments or data centers with insufficient physical security. However, once exploited, the attacker gains a powerful foothold at the hardware level, potentially evading software-based security controls and making detection and remediation more difficult. This could facilitate advanced persistent threats (APTs) or sabotage of critical systems. The broad range of affected ASUS chipsets means many organizations using these motherboards could be vulnerable if firmware is not updated. The lack of known exploits in the wild provides a window for proactive defense, but the high severity necessitates urgent attention.

Mitigation Recommendations

1. Immediately apply the latest UEFI firmware updates from ASUS for all affected motherboard models to remediate the vulnerability. 2. Implement strict physical security controls to prevent unauthorized personnel from accessing internal expansion slots, including locked server racks and restricted access areas. 3. Conduct regular hardware audits to detect any unauthorized devices connected to internal buses or expansion slots. 4. Employ hardware-based intrusion detection mechanisms where possible to alert on tampering or unauthorized hardware additions. 5. Educate IT and security staff about the risks of physical access attacks and the importance of securing hardware components. 6. Integrate firmware integrity verification into routine security assessments to ensure no unauthorized modifications. 7. For high-security environments, consider additional hardware protections such as port blockers or tamper-evident seals on internal slots. 8. Maintain an incident response plan that includes procedures for handling suspected hardware-level compromises. 9. Collaborate with ASUS and monitor security advisories for any further updates or patches related to this vulnerability. 10. Limit the use of affected ASUS motherboards in critical systems where possible, or isolate them within segmented network zones to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-10-17T06:47:40.071Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69423560364d4dab9cc00c3b

Added to database: 12/17/2025, 4:45:20 AM

Last enriched: 12/17/2025, 5:00:46 AM

Last updated: 12/17/2025, 6:07:18 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats