Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9336: CWE-121 - Stack-based Buffer Overflow in ASUS Armoury Crate

0
Medium
VulnerabilityCVE-2025-9336cvecve-2025-9336cwe-121
Published: Mon Oct 13 2025 (10/13/2025, 09:24:04 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Armoury Crate

Description

A stack buffer overflow has been identified in the AsIO3.sys driver. This vulnerability can be triggered by input manipulation, may leading to a system crash (BSOD) or other potentially undefined execution. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:47:07 UTC

Technical Analysis

CVE-2025-9336 is a stack-based buffer overflow vulnerability identified in the AsIO3.sys driver component of ASUS Armoury Crate software, affecting versions prior to 6.3.4. The vulnerability arises from improper input validation or manipulation that allows an attacker with local low-privileged access to overwrite stack memory. This can lead to a system crash (Blue Screen of Death) or potentially undefined execution paths, which might be leveraged for further exploitation, although no privilege escalation or remote code execution is directly indicated. The flaw is classified under CWE-121, which pertains to stack-based buffer overflows, a common and dangerous class of vulnerabilities. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). The impact is primarily on availability (VA:H), with no direct impact on confidentiality or integrity. The vulnerability was reserved in August 2025 and published in October 2025, with no known exploits in the wild at the time of publication. ASUS has released a security advisory recommending updates to Armoury Crate version 6.3.4 or later to remediate the issue. The vulnerability affects systems running ASUS Armoury Crate, a utility commonly installed on ASUS consumer and gaming hardware to manage device settings and performance.

Potential Impact

For European organizations, the primary impact of CVE-2025-9336 is on system stability and availability. A successful exploitation could cause unexpected system crashes, leading to potential downtime and disruption of business operations. While the vulnerability does not directly enable privilege escalation or remote compromise, the resulting system instability could be exploited as part of a multi-stage attack or cause denial of service in critical environments. Organizations relying on ASUS hardware with Armoury Crate installed, especially in sectors such as finance, healthcare, manufacturing, and government, may face operational risks if systems become unstable. Additionally, the presence of this vulnerability could be leveraged by insider threats or malware that gains local access to escalate disruption. The lack of known exploits reduces immediate risk, but the medium severity rating and ease of local exploitation warrant prompt mitigation to prevent future exploitation attempts.

Mitigation Recommendations

European organizations should immediately verify the version of ASUS Armoury Crate installed on their systems and upgrade to version 6.3.4 or later, where the vulnerability is patched. Since the vulnerability requires local access, enforcing strict access controls and limiting administrative privileges can reduce the risk of exploitation. Employ endpoint detection and response (EDR) solutions to monitor for unusual local activity that could indicate attempts to exploit the driver. Regularly audit and restrict software installations to prevent unauthorized deployment of vulnerable versions. Implement system integrity monitoring to detect crashes or abnormal behavior related to AsIO3.sys. For critical environments, consider isolating ASUS hardware or limiting its use until patched. Maintain up-to-date backups and incident response plans to quickly recover from potential disruptions caused by exploitation. Finally, stay informed through ASUS security advisories and threat intelligence feeds for updates or emerging exploit information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASUS
Date Reserved
2025-08-22T02:50:55.190Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecc911ff270e1f1a06920d

Added to database: 10/13/2025, 9:40:33 AM

Last enriched: 10/21/2025, 12:47:07 AM

Last updated: 12/3/2025, 4:18:55 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats