CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
AI Analysis
Technical Summary
CVE-2025-59374 is a critical vulnerability classified under CWE-506, which pertains to embedded malicious code. The vulnerability stems from a supply chain compromise affecting certain versions of the ASUS Live Update client software prior to version 3.6.6. During the build or distribution process, unauthorized modifications were introduced, embedding malicious code within the software. This malicious code can cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring any user interaction, privileges, or authentication. The vulnerability has a CVSS 4.0 base score of 9.3, indicating a critical severity due to its network attack vector, low attack complexity, and no required privileges or user interaction. The impact covers confidentiality, integrity, and availability, with high potential for damage. Importantly, the ASUS Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices are affected. No patches or updates are available, and no known exploits have been reported in the wild. The threat primarily concerns legacy ASUS devices still running outdated versions of the Live Update client, which may be present in some enterprise environments. The supply chain nature of the compromise highlights risks in software distribution and update mechanisms, emphasizing the need for supply chain security vigilance.
Potential Impact
For European organizations, the impact of CVE-2025-59374 can be significant if legacy ASUS devices with outdated Live Update clients are in use, especially within critical infrastructure, government, or large enterprises. The embedded malicious code could lead to unauthorized remote code execution, data exfiltration, system manipulation, or denial of service, compromising confidentiality, integrity, and availability of affected systems. Given the vulnerability requires no privileges or user interaction, exploitation could be automated and widespread within vulnerable environments. The lack of patches and the EOS status of the software complicate remediation, potentially leaving some organizations exposed if they continue to rely on legacy ASUS hardware. This could result in operational disruptions, data breaches, and reputational damage. Additionally, the supply chain compromise aspect raises concerns about trust in software updates and the potential for similar attacks on other vendors, increasing overall risk awareness in Europe.
Mitigation Recommendations
1. Identify and inventory all ASUS devices within the organization, focusing on those running the ASUS Live Update client prior to version 3.6.6. 2. Where possible, uninstall the ASUS Live Update client from legacy devices or disable its automatic update functionality to prevent execution of compromised code. 3. For devices that cannot remove the client, isolate them within segmented network zones to limit exposure and monitor network traffic for suspicious activity. 4. Conduct thorough forensic analysis and endpoint detection to identify any signs of compromise linked to this vulnerability. 5. Implement strict supply chain security policies, including verifying software integrity and authenticity before deployment. 6. Educate IT and security teams about the risks of using unsupported software and the importance of timely upgrades or hardware replacement. 7. Engage with ASUS or authorized partners to seek guidance on legacy device management and potential mitigation tools. 8. Enhance network monitoring and intrusion detection systems to detect unusual behaviors indicative of exploitation attempts. 9. Develop incident response plans tailored to supply chain compromise scenarios to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
Description
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-59374 is a critical vulnerability classified under CWE-506, which pertains to embedded malicious code. The vulnerability stems from a supply chain compromise affecting certain versions of the ASUS Live Update client software prior to version 3.6.6. During the build or distribution process, unauthorized modifications were introduced, embedding malicious code within the software. This malicious code can cause affected devices that meet specific targeting conditions to execute unintended and potentially harmful actions without requiring any user interaction, privileges, or authentication. The vulnerability has a CVSS 4.0 base score of 9.3, indicating a critical severity due to its network attack vector, low attack complexity, and no required privileges or user interaction. The impact covers confidentiality, integrity, and availability, with high potential for damage. Importantly, the ASUS Live Update client reached End-of-Support in October 2021, meaning no currently supported ASUS devices are affected. No patches or updates are available, and no known exploits have been reported in the wild. The threat primarily concerns legacy ASUS devices still running outdated versions of the Live Update client, which may be present in some enterprise environments. The supply chain nature of the compromise highlights risks in software distribution and update mechanisms, emphasizing the need for supply chain security vigilance.
Potential Impact
For European organizations, the impact of CVE-2025-59374 can be significant if legacy ASUS devices with outdated Live Update clients are in use, especially within critical infrastructure, government, or large enterprises. The embedded malicious code could lead to unauthorized remote code execution, data exfiltration, system manipulation, or denial of service, compromising confidentiality, integrity, and availability of affected systems. Given the vulnerability requires no privileges or user interaction, exploitation could be automated and widespread within vulnerable environments. The lack of patches and the EOS status of the software complicate remediation, potentially leaving some organizations exposed if they continue to rely on legacy ASUS hardware. This could result in operational disruptions, data breaches, and reputational damage. Additionally, the supply chain compromise aspect raises concerns about trust in software updates and the potential for similar attacks on other vendors, increasing overall risk awareness in Europe.
Mitigation Recommendations
1. Identify and inventory all ASUS devices within the organization, focusing on those running the ASUS Live Update client prior to version 3.6.6. 2. Where possible, uninstall the ASUS Live Update client from legacy devices or disable its automatic update functionality to prevent execution of compromised code. 3. For devices that cannot remove the client, isolate them within segmented network zones to limit exposure and monitor network traffic for suspicious activity. 4. Conduct thorough forensic analysis and endpoint detection to identify any signs of compromise linked to this vulnerability. 5. Implement strict supply chain security policies, including verifying software integrity and authenticity before deployment. 6. Educate IT and security teams about the risks of using unsupported software and the importance of timely upgrades or hardware replacement. 7. Engage with ASUS or authorized partners to seek guidance on legacy device management and potential mitigation tools. 8. Enhance network monitoring and intrusion detection systems to detect unusual behaviors indicative of exploitation attempts. 9. Develop incident response plans tailored to supply chain compromise scenarios to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASUS
- Date Reserved
- 2025-09-15T01:36:47.359Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69423560364d4dab9cc00c52
Added to database: 12/17/2025, 4:45:20 AM
Last enriched: 12/17/2025, 5:00:24 AM
Last updated: 12/17/2025, 5:55:26 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14154: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss
MediumCVE-2025-14385: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds WP Recipe Maker
MediumCVE-2025-13880: CWE-862 Missing Authorization in adreastrian WP Social Ninja – Embed Social Feeds, User Reviews & Chat Widgets
MediumCVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin
MediumCVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.