Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update

0
Critical
VulnerabilityCVE-2025-59374cvecve-2025-59374cwe-506
Published: Wed Dec 17 2025 (12/17/2025, 04:27:06 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: live update

Description

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:46:35 UTC

Technical Analysis

CVE-2025-59374 is a critical supply chain vulnerability identified in certain versions of the ASUS Live Update client software distributed before version 3.6.6. The vulnerability stems from unauthorized modifications embedded into the software builds via a supply chain compromise, classified under CWE-506 (Embedded Malicious Code). This malicious code could cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring user interaction, privileges, or authentication. The compromised Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices or products are affected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild, the presence of embedded malicious code in a widely used update mechanism poses a significant risk. The vulnerability highlights the dangers of supply chain attacks, where trusted software components are compromised before distribution. Organizations with legacy ASUS hardware still running outdated Live Update clients are vulnerable to this threat and should take immediate action to mitigate risks.

Potential Impact

The impact of CVE-2025-59374 is critical due to the potential for unauthorized code execution on affected devices without any user interaction or privileges. This can lead to severe confidentiality breaches, data integrity violations, and availability disruptions. Since the ASUS Live Update client is a trusted system component responsible for updating firmware and software, malicious modifications could allow attackers to deploy persistent backdoors, exfiltrate sensitive information, or disrupt system operations. The supply chain nature of the compromise increases the risk of widespread infection across organizations relying on ASUS hardware with legacy software. Although currently no active exploits are reported, the vulnerability could be leveraged in targeted attacks against organizations with outdated ASUS systems, potentially impacting sectors such as government, defense, manufacturing, and enterprises with large ASUS hardware deployments. The end-of-support status of the affected software complicates remediation and increases exposure for legacy systems still in operation.

Mitigation Recommendations

1. Immediately identify and inventory all ASUS devices running the Live Update client versions prior to 3.6.6, especially those that have not been updated since before October 2021. 2. Disable or uninstall the ASUS Live Update client on legacy systems where possible to prevent execution of compromised update mechanisms. 3. For systems that require ASUS Live Update, upgrade to a supported version or apply vendor-provided patches if available; if no patches exist due to EOS status, consider hardware replacement or isolation of affected devices. 4. Implement network segmentation and strict egress filtering to limit the ability of compromised devices to communicate with external command and control servers. 5. Monitor network and endpoint logs for unusual activity indicative of exploitation attempts, such as unexpected process executions or network connections originating from ASUS update components. 6. Employ application allowlisting to prevent unauthorized code execution from the ASUS Live Update client directory. 7. Enhance supply chain security by validating software integrity using cryptographic signatures and verifying update sources. 8. Educate IT and security teams about the risks of legacy software and the importance of timely decommissioning or patching of unsupported components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.359Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69423560364d4dab9cc00c52

Added to database: 12/17/2025, 4:45:20 AM

Last enriched: 2/27/2026, 6:46:35 AM

Last updated: 3/24/2026, 11:46:53 PM

Views: 500

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses