Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9968: CWE-59 Improper Link Resolution Before File Access ('Link Following') in ASUS Armoury Crate

0
High
VulnerabilityCVE-2025-9968cvecve-2025-9968cwe-59
Published: Mon Oct 13 2025 (10/13/2025, 08:13:33 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Armoury Crate

Description

A link following vulnerability exists in the UnifyScanner component of Armoury Crate. This vulnerability may be triggered by creating a specially crafted junction, potentially leading to local privilege escalation. For more information, please refer to section 'Security Update for Armoury Crate App' in the ASUS Security Advisory.

AI-Powered Analysis

AILast updated: 10/13/2025, 08:48:09 UTC

Technical Analysis

CVE-2025-9968 is a vulnerability identified in the UnifyScanner component of ASUS Armoury Crate, a utility software commonly pre-installed or used on ASUS devices for hardware configuration and system monitoring. The vulnerability is classified under CWE-59, which involves improper link resolution before file access, often referred to as 'link following'. In this case, the flaw allows an attacker with local access to create a specially crafted NTFS junction point (a type of symbolic link on Windows systems) that the UnifyScanner component improperly resolves. This improper handling can cause the software to access or modify files outside of intended directories, potentially leading to local privilege escalation (LPE). The attacker can leverage this to execute code or perform actions with elevated privileges, bypassing normal security controls. The vulnerability affects Armoury Crate versions prior to 6.3.4. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the attack requires local access with low complexity, no user interaction, and low privileges initially, but results in high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the nature of the vulnerability means it could be exploited by malicious insiders or malware that gains local access. The vulnerability does not require network access or user interaction, making it a significant risk on affected systems. The ASUS Security Advisory recommends updating to version 6.3.4 or later to remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a significant risk because ASUS hardware and Armoury Crate software are widely used in consumer and enterprise environments, including IT departments, gaming sectors, and creative industries. Successful exploitation can lead to local privilege escalation, allowing attackers or malware to gain administrative control over affected systems. This can result in unauthorized access to sensitive data, installation of persistent malware, or disruption of system operations. Given the high CVSS score and the lack of required user interaction, the vulnerability could be exploited by insiders or automated malware once local access is obtained. This elevates the threat level in environments where endpoint security is critical. Additionally, compromised systems could serve as footholds for lateral movement within corporate networks, increasing the risk of broader breaches. The impact on confidentiality, integrity, and availability is high, potentially affecting compliance with European data protection regulations such as GDPR if sensitive data is exposed or manipulated.

Mitigation Recommendations

1. Immediately update ASUS Armoury Crate to version 6.3.4 or later, as this version contains the patch for CVE-2025-9968. 2. Restrict local user permissions to prevent the creation of NTFS junction points or symbolic links by non-administrative users. This can be enforced via Group Policy or endpoint security solutions. 3. Implement application whitelisting and endpoint detection and response (EDR) tools to monitor and block suspicious file system activities, especially those involving junction points or link manipulation. 4. Conduct regular audits of local file system permissions and junction points to detect unauthorized or suspicious configurations. 5. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of applying security updates promptly. 6. In environments where Armoury Crate is not essential, consider uninstalling or disabling the software to reduce the attack surface. 7. Monitor security advisories from ASUS and related threat intelligence sources for updates or emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASUS
Date Reserved
2025-09-04T06:41:21.334Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecbcbcfcb31871cb6ddb24

Added to database: 10/13/2025, 8:47:56 AM

Last enriched: 10/13/2025, 8:48:09 AM

Last updated: 10/13/2025, 11:06:06 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats