CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
AI Analysis
Technical Summary
CVE-2025-59374 is a critical supply chain vulnerability identified in certain versions of the ASUS Live Update client software distributed before version 3.6.6. The vulnerability stems from unauthorized modifications embedded into the software builds via a supply chain compromise, classified under CWE-506 (Embedded Malicious Code). This malicious code could cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring user interaction, privileges, or authentication. The compromised Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices or products are affected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild, the presence of embedded malicious code in a widely used update mechanism poses a significant risk. The vulnerability highlights the dangers of supply chain attacks, where trusted software components are compromised before distribution. Organizations with legacy ASUS hardware still running outdated Live Update clients are vulnerable to this threat and should take immediate action to mitigate risks.
Potential Impact
The impact of CVE-2025-59374 is critical due to the potential for unauthorized code execution on affected devices without any user interaction or privileges. This can lead to severe confidentiality breaches, data integrity violations, and availability disruptions. Since the ASUS Live Update client is a trusted system component responsible for updating firmware and software, malicious modifications could allow attackers to deploy persistent backdoors, exfiltrate sensitive information, or disrupt system operations. The supply chain nature of the compromise increases the risk of widespread infection across organizations relying on ASUS hardware with legacy software. Although currently no active exploits are reported, the vulnerability could be leveraged in targeted attacks against organizations with outdated ASUS systems, potentially impacting sectors such as government, defense, manufacturing, and enterprises with large ASUS hardware deployments. The end-of-support status of the affected software complicates remediation and increases exposure for legacy systems still in operation.
Mitigation Recommendations
1. Immediately identify and inventory all ASUS devices running the Live Update client versions prior to 3.6.6, especially those that have not been updated since before October 2021. 2. Disable or uninstall the ASUS Live Update client on legacy systems where possible to prevent execution of compromised update mechanisms. 3. For systems that require ASUS Live Update, upgrade to a supported version or apply vendor-provided patches if available; if no patches exist due to EOS status, consider hardware replacement or isolation of affected devices. 4. Implement network segmentation and strict egress filtering to limit the ability of compromised devices to communicate with external command and control servers. 5. Monitor network and endpoint logs for unusual activity indicative of exploitation attempts, such as unexpected process executions or network connections originating from ASUS update components. 6. Employ application allowlisting to prevent unauthorized code execution from the ASUS Live Update client directory. 7. Enhance supply chain security by validating software integrity using cryptographic signatures and verifying update sources. 8. Educate IT and security teams about the risks of legacy software and the importance of timely decommissioning or patching of unsupported components.
Affected Countries
United States, China, Taiwan, Germany, Japan, South Korea, India, United Kingdom, France, Canada
CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
Description
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59374 is a critical supply chain vulnerability identified in certain versions of the ASUS Live Update client software distributed before version 3.6.6. The vulnerability stems from unauthorized modifications embedded into the software builds via a supply chain compromise, classified under CWE-506 (Embedded Malicious Code). This malicious code could cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring user interaction, privileges, or authentication. The compromised Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices or products are affected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild, the presence of embedded malicious code in a widely used update mechanism poses a significant risk. The vulnerability highlights the dangers of supply chain attacks, where trusted software components are compromised before distribution. Organizations with legacy ASUS hardware still running outdated Live Update clients are vulnerable to this threat and should take immediate action to mitigate risks.
Potential Impact
The impact of CVE-2025-59374 is critical due to the potential for unauthorized code execution on affected devices without any user interaction or privileges. This can lead to severe confidentiality breaches, data integrity violations, and availability disruptions. Since the ASUS Live Update client is a trusted system component responsible for updating firmware and software, malicious modifications could allow attackers to deploy persistent backdoors, exfiltrate sensitive information, or disrupt system operations. The supply chain nature of the compromise increases the risk of widespread infection across organizations relying on ASUS hardware with legacy software. Although currently no active exploits are reported, the vulnerability could be leveraged in targeted attacks against organizations with outdated ASUS systems, potentially impacting sectors such as government, defense, manufacturing, and enterprises with large ASUS hardware deployments. The end-of-support status of the affected software complicates remediation and increases exposure for legacy systems still in operation.
Mitigation Recommendations
1. Immediately identify and inventory all ASUS devices running the Live Update client versions prior to 3.6.6, especially those that have not been updated since before October 2021. 2. Disable or uninstall the ASUS Live Update client on legacy systems where possible to prevent execution of compromised update mechanisms. 3. For systems that require ASUS Live Update, upgrade to a supported version or apply vendor-provided patches if available; if no patches exist due to EOS status, consider hardware replacement or isolation of affected devices. 4. Implement network segmentation and strict egress filtering to limit the ability of compromised devices to communicate with external command and control servers. 5. Monitor network and endpoint logs for unusual activity indicative of exploitation attempts, such as unexpected process executions or network connections originating from ASUS update components. 6. Employ application allowlisting to prevent unauthorized code execution from the ASUS Live Update client directory. 7. Enhance supply chain security by validating software integrity using cryptographic signatures and verifying update sources. 8. Educate IT and security teams about the risks of legacy software and the importance of timely decommissioning or patching of unsupported components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASUS
- Date Reserved
- 2025-09-15T01:36:47.359Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69423560364d4dab9cc00c52
Added to database: 12/17/2025, 4:45:20 AM
Last enriched: 2/27/2026, 6:46:35 AM
Last updated: 3/24/2026, 11:46:53 PM
Views: 500
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.