Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update

0
Critical
VulnerabilityCVE-2025-59374cvecve-2025-59374cwe-506
Published: Wed Dec 17 2025 (12/17/2025, 04:27:06 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: live update

Description

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 05:00:24 UTC

Technical Analysis

CVE-2025-59374 is a critical vulnerability classified under CWE-506, which pertains to embedded malicious code. The vulnerability stems from a supply chain compromise affecting certain versions of the ASUS Live Update client software prior to version 3.6.6. During the build or distribution process, unauthorized modifications were introduced, embedding malicious code within the software. This malicious code can cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring any user interaction, privileges, or authentication. The vulnerability has a CVSS 4.0 base score of 9.3, indicating a critical severity due to its network attack vector, low attack complexity, and no required privileges or user interaction. The impact covers confidentiality, integrity, and availability, with high potential for damage. Importantly, the ASUS Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices are affected. No patches or updates are available, and no known exploits have been reported in the wild. The threat primarily concerns legacy ASUS devices still running outdated versions of the Live Update client, which may be present in some enterprise environments. The supply chain nature of the compromise highlights risks in software distribution and update mechanisms, emphasizing the need for supply chain security vigilance.

Potential Impact

For European organizations, the impact of CVE-2025-59374 can be significant if legacy ASUS devices with outdated Live Update clients are in use, especially within critical infrastructure, government, or large enterprises. The embedded malicious code could lead to unauthorized remote code execution, data exfiltration, system manipulation, or denial of service, compromising confidentiality, integrity, and availability of affected systems. Given the vulnerability requires no privileges or user interaction, exploitation could be automated and widespread within vulnerable environments. The lack of patches and the EOS status of the software complicate remediation, potentially leaving some organizations exposed if they continue to rely on legacy ASUS hardware. This could result in operational disruptions, data breaches, and reputational damage. Additionally, the supply chain compromise aspect raises concerns about trust in software updates and the potential for similar attacks on other vendors, increasing overall risk awareness in Europe.

Mitigation Recommendations

1. Identify and inventory all ASUS devices within the organization, focusing on those running the ASUS Live Update client prior to version 3.6.6. 2. Where possible, uninstall the ASUS Live Update client from legacy devices or disable its automatic update functionality to prevent execution of compromised code. 3. For devices that cannot remove the client, isolate them within segmented network zones to limit exposure and monitor network traffic for suspicious activity. 4. Conduct thorough forensic analysis and endpoint detection to identify any signs of compromise linked to this vulnerability. 5. Implement strict supply chain security policies, including verifying software integrity and authenticity before deployment. 6. Educate IT and security teams about the risks of using unsupported software and the importance of timely upgrades or hardware replacement. 7. Engage with ASUS or authorized partners to seek guidance on legacy device management and potential mitigation tools. 8. Enhance network monitoring and intrusion detection systems to detect unusual behaviors indicative of exploitation attempts. 9. Develop incident response plans tailored to supply chain compromise scenarios to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.359Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69423560364d4dab9cc00c52

Added to database: 12/17/2025, 4:45:20 AM

Last enriched: 12/17/2025, 5:00:24 AM

Last updated: 12/17/2025, 5:55:26 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats