Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9968: CWE-59 Improper Link Resolution Before File Access ('Link Following') in ASUS Armoury Crate

0
High
VulnerabilityCVE-2025-9968cvecve-2025-9968cwe-59
Published: Mon Oct 13 2025 (10/13/2025, 08:13:33 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Armoury Crate

Description

A link following vulnerability exists in the UnifyScanner component of Armoury Crate. This vulnerability may be triggered by creating a specially crafted junction, potentially leading to local privilege escalation. For more information, please refer to section 'Security Update for Armoury Crate App' in the ASUS Security Advisory.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:50:24 UTC

Technical Analysis

CVE-2025-9968 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') found in the UnifyScanner component of ASUS Armoury Crate software. Armoury Crate is a utility used primarily on ASUS devices to manage hardware settings and system monitoring. The vulnerability arises because the software improperly resolves symbolic links or junctions before accessing files, allowing an attacker to manipulate the file system path resolution process. Specifically, by creating a specially crafted junction—a type of reparse point in Windows file systems—an attacker with local access and limited privileges can trick the software into accessing or modifying files in unintended locations. This can lead to local privilege escalation, where the attacker gains higher system privileges than originally granted. The vulnerability affects Armoury Crate versions before 6.3.4. The CVSS 4.0 base score of 8.5 indicates a high-severity issue, with attack vector being local (AV:L), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as indicated by the CVSS vector. No known exploits have been reported in the wild, but the potential for exploitation exists given the nature of the flaw. The vulnerability was publicly disclosed on October 13, 2025, with the reservation date on September 4, 2025. ASUS has released security advisories recommending updates to mitigate this issue, though no direct patch links were provided in the data. The vulnerability is particularly relevant for environments where Armoury Crate is installed and used, including enterprise and consumer ASUS device users.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where ASUS hardware with Armoury Crate software is deployed, such as corporate workstations, gaming setups, or specialized hardware management scenarios. Successful exploitation can lead to local privilege escalation, allowing attackers to gain administrative or SYSTEM-level access from a lower-privileged user account. This can facilitate further malicious activities including installation of persistent malware, unauthorized access to sensitive data, disabling security controls, or lateral movement within a network. The impact on confidentiality, integrity, and availability is high, as attackers could manipulate system files or configurations. Although exploitation requires local access, many organizations allow multiple users on shared systems or have endpoints exposed to insider threats, increasing risk. The lack of user interaction and authentication requirements lowers the barrier for exploitation once local access is obtained. Given the widespread use of ASUS devices in Europe, especially in sectors like education, government, and enterprises, the vulnerability could be leveraged for targeted attacks or insider threat scenarios. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, emphasizing the need for proactive mitigation.

Mitigation Recommendations

1. Update Armoury Crate to version 6.3.4 or later immediately, as this version includes fixes for CVE-2025-9968. 2. Restrict local user permissions to the minimum necessary, preventing untrusted users from creating junctions or symbolic links in sensitive directories. 3. Implement application whitelisting and endpoint detection to monitor and block suspicious file system activities, particularly the creation of junction points or symbolic links by non-administrative users. 4. Use Windows security features such as Controlled Folder Access and enhanced auditing to detect and prevent unauthorized file system modifications. 5. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and encourage reporting of unusual system behavior. 6. Regularly audit systems for outdated Armoury Crate versions and unauthorized junctions or symbolic links. 7. In high-security environments, consider restricting or disabling Armoury Crate if not essential, or isolating affected devices from critical network segments. 8. Monitor ASUS security advisories for any updates or patches related to this vulnerability and apply them promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASUS
Date Reserved
2025-09-04T06:41:21.334Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecbcbcfcb31871cb6ddb24

Added to database: 10/13/2025, 8:47:56 AM

Last enriched: 10/21/2025, 12:50:24 AM

Last updated: 12/5/2025, 12:25:46 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats