Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9968: CWE-59 Improper Link Resolution Before File Access ('Link Following') in ASUS Armoury Crate

0
High
VulnerabilityCVE-2025-9968cvecve-2025-9968cwe-59
Published: Mon Oct 13 2025 (10/13/2025, 08:13:33 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Armoury Crate

Description

A link following vulnerability exists in the UnifyScanner component of Armoury Crate. This vulnerability may be triggered by creating a specially crafted junction, potentially leading to local privilege escalation. For more information, please refer to section 'Security Update for Armoury Crate App' in the ASUS Security Advisory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:32:52 UTC

Technical Analysis

CVE-2025-9968 is a vulnerability identified in the UnifyScanner component of ASUS Armoury Crate, a software suite widely used for system monitoring and device management on ASUS hardware. The flaw is categorized under CWE-59, which involves improper link resolution before file access, commonly referred to as 'link following.' This vulnerability can be triggered by an attacker creating a specially crafted NTFS junction point (a type of symbolic link in Windows) that the UnifyScanner component follows incorrectly. When the software accesses files through this malicious junction, it may inadvertently perform operations on unintended files or directories. This behavior can be exploited to escalate privileges locally by overwriting or manipulating sensitive files that require higher privileges, thereby granting the attacker elevated access on the affected system. The vulnerability affects Armoury Crate versions prior to 6.3.4 and requires the attacker to have local low-privilege access but does not require user interaction, making it easier to exploit once local access is obtained. The CVSS 4.0 base score of 8.5 reflects a high severity due to the combination of local attack vector, low attack complexity, no required authentication, and the potential for complete compromise of confidentiality, integrity, and availability. Although no public exploits are known at this time, the vulnerability poses a significant risk to users of ASUS Armoury Crate, especially in environments where local user accounts are shared or less strictly controlled. The issue was publicly disclosed in October 2025, with ASUS providing a security advisory recommending updates to version 6.3.4 or later to remediate the flaw.

Potential Impact

The primary impact of CVE-2025-9968 is local privilege escalation, which can allow an attacker with limited access to gain administrative or SYSTEM-level privileges on affected Windows machines running ASUS Armoury Crate. This elevation of privilege can lead to full system compromise, enabling attackers to install persistent malware, exfiltrate sensitive data, disable security controls, or disrupt system availability. Organizations relying on ASUS hardware and Armoury Crate for device management and monitoring are at risk of internal threat actors or malware leveraging this vulnerability to escalate privileges and move laterally within networks. The vulnerability undermines the confidentiality, integrity, and availability of affected systems. Given Armoury Crate's widespread use in consumer and enterprise ASUS devices, the scope of affected systems is broad. The lack of required user interaction increases the likelihood of exploitation once local access is achieved. Although no exploits are currently known in the wild, the vulnerability's characteristics make it a valuable target for attackers seeking to deepen footholds in compromised environments.

Mitigation Recommendations

To mitigate CVE-2025-9968, organizations and users should immediately update ASUS Armoury Crate to version 6.3.4 or later once available, as this is the definitive fix provided by the vendor. Until patches are applied, restrict local user permissions to prevent untrusted users from creating junction points or manipulating file system links. Employ application whitelisting and endpoint detection solutions to monitor and block suspicious file system activities, especially the creation of NTFS junctions in directories accessed by Armoury Crate. Conduct regular audits of local user accounts and privileges to minimize the risk of unauthorized local access. Consider disabling or uninstalling Armoury Crate if it is not essential, particularly on systems with multiple users or in high-security environments. Additionally, monitor system logs for unusual file access patterns or errors related to junction points. Implement strict endpoint security policies to reduce the attack surface and prevent lateral movement by attackers who might exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASUS
Date Reserved
2025-09-04T06:41:21.334Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ecbcbcfcb31871cb6ddb24

Added to database: 10/13/2025, 8:47:56 AM

Last enriched: 2/27/2026, 4:32:52 AM

Last updated: 3/24/2026, 2:51:28 PM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses