CVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
AI Analysis
Technical Summary
CVE-2025-11901 is an improper access control vulnerability (CWE-284) identified in a broad range of ASUS motherboards utilizing Intel chipsets including B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, and W680 series. The vulnerability arises from uncontrolled resource consumption that can be triggered by an attacker who gains physical access to the internal expansion slots of the affected motherboard. By installing a specially crafted device along with a supporting software utility, the attacker can exploit this flaw to induce uncontrolled resource consumption, which escalates the risk of unauthorized direct memory access (DMA). This unauthorized DMA can lead to compromise of system confidentiality, integrity, and availability by bypassing typical software security controls. The attack vector requires physical presence and hardware manipulation but does not require any authentication or user interaction once physical access is achieved. The vulnerability affects firmware components, specifically the UEFI firmware, which ASUS has addressed through security updates. The CVSS 4.0 vector indicates a high impact on confidentiality, integrity, and availability with low attack complexity and no privileges or user interaction required, but physical access is mandatory. No public exploits have been reported yet, but the potential for serious impact exists especially in environments where physical security is weaker or where high-value targets are present. The affected versions are those before firmware versions 1805, 2002, and 3002. Organizations should refer to ASUS’s security advisory for detailed patching instructions.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly in sectors where ASUS motherboards with the affected Intel chipsets are deployed in critical infrastructure, enterprise servers, or sensitive workstations. The requirement for physical access limits remote exploitation but increases the threat from insider attacks, supply chain compromises, or physical breaches. Successful exploitation can lead to unauthorized DMA, allowing attackers to bypass operating system protections, extract sensitive data, inject malicious code, or cause system instability and denial of service. This can impact confidentiality by exposing sensitive information, integrity by allowing unauthorized code execution or data manipulation, and availability by causing resource exhaustion or system crashes. The risk is heightened in environments with shared physical access or insufficient hardware security controls. European organizations with high-value intellectual property, government data, or critical operational technology should consider this vulnerability a serious threat. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit development could leverage the publicly known details.
Mitigation Recommendations
1. Apply the latest UEFI firmware updates from ASUS immediately to all affected motherboards, ensuring versions are at or above 1805, 2002, or 3002 as applicable. 2. Enhance physical security controls to restrict unauthorized access to internal expansion slots, including locked server racks, secured data centers, and surveillance. 3. Implement strict hardware inventory and monitoring to detect unauthorized devices connected to expansion slots. 4. Use chassis intrusion detection features where available to alert on unauthorized physical access. 5. Educate staff on the risks of physical tampering and enforce policies restricting physical access to critical hardware. 6. Consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous DMA activity or resource consumption patterns. 7. For high-security environments, evaluate the use of hardware-based DMA protection technologies such as Intel VT-d or IOMMU to limit unauthorized memory access. 8. Coordinate with ASUS support and security advisories for ongoing updates and guidance. 9. Conduct regular security audits and penetration tests focusing on physical security and hardware tampering vectors.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Switzerland
CVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
Description
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
AI-Powered Analysis
Technical Analysis
CVE-2025-11901 is an improper access control vulnerability (CWE-284) identified in a broad range of ASUS motherboards utilizing Intel chipsets including B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, and W680 series. The vulnerability arises from uncontrolled resource consumption that can be triggered by an attacker who gains physical access to the internal expansion slots of the affected motherboard. By installing a specially crafted device along with a supporting software utility, the attacker can exploit this flaw to induce uncontrolled resource consumption, which escalates the risk of unauthorized direct memory access (DMA). This unauthorized DMA can lead to compromise of system confidentiality, integrity, and availability by bypassing typical software security controls. The attack vector requires physical presence and hardware manipulation but does not require any authentication or user interaction once physical access is achieved. The vulnerability affects firmware components, specifically the UEFI firmware, which ASUS has addressed through security updates. The CVSS 4.0 vector indicates a high impact on confidentiality, integrity, and availability with low attack complexity and no privileges or user interaction required, but physical access is mandatory. No public exploits have been reported yet, but the potential for serious impact exists especially in environments where physical security is weaker or where high-value targets are present. The affected versions are those before firmware versions 1805, 2002, and 3002. Organizations should refer to ASUS’s security advisory for detailed patching instructions.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly in sectors where ASUS motherboards with the affected Intel chipsets are deployed in critical infrastructure, enterprise servers, or sensitive workstations. The requirement for physical access limits remote exploitation but increases the threat from insider attacks, supply chain compromises, or physical breaches. Successful exploitation can lead to unauthorized DMA, allowing attackers to bypass operating system protections, extract sensitive data, inject malicious code, or cause system instability and denial of service. This can impact confidentiality by exposing sensitive information, integrity by allowing unauthorized code execution or data manipulation, and availability by causing resource exhaustion or system crashes. The risk is heightened in environments with shared physical access or insufficient hardware security controls. European organizations with high-value intellectual property, government data, or critical operational technology should consider this vulnerability a serious threat. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit development could leverage the publicly known details.
Mitigation Recommendations
1. Apply the latest UEFI firmware updates from ASUS immediately to all affected motherboards, ensuring versions are at or above 1805, 2002, or 3002 as applicable. 2. Enhance physical security controls to restrict unauthorized access to internal expansion slots, including locked server racks, secured data centers, and surveillance. 3. Implement strict hardware inventory and monitoring to detect unauthorized devices connected to expansion slots. 4. Use chassis intrusion detection features where available to alert on unauthorized physical access. 5. Educate staff on the risks of physical tampering and enforce policies restricting physical access to critical hardware. 6. Consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous DMA activity or resource consumption patterns. 7. For high-security environments, evaluate the use of hardware-based DMA protection technologies such as Intel VT-d or IOMMU to limit unauthorized memory access. 8. Coordinate with ASUS support and security advisories for ongoing updates and guidance. 9. Conduct regular security audits and penetration tests focusing on physical security and hardware tampering vectors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASUS
- Date Reserved
- 2025-10-17T06:47:40.071Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69423560364d4dab9cc00c3b
Added to database: 12/17/2025, 4:45:20 AM
Last enriched: 12/24/2025, 5:54:59 AM
Last updated: 2/6/2026, 6:12:36 PM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2060: SQL Injection in code-projects Simple Blood Donor Management System
MediumCVE-2026-24903: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in AlgoNetLab OrcaStatLLM-Researcher
MediumCVE-2025-70963: n/a
UnknownCVE-2026-1769: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Xerox CentreWare
MediumCVE-2026-2059: SQL Injection in SourceCodester Medical Center Portal Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.