TechyMag.co.uk - is an online magazine where you can find news and updates on modern technologies

Recent Posts


Back
Software

Asus Urges Immediate Software and Router Updates to Patch Critical Security Vulnerability

Asus Urges Immediate Software and Router Updates to Patch Critical Security Vulnerability
0 0 73 0

Asus Urges Swift Software Updates Amidst Critical Vulnerability Discovery

Asus has issued an urgent call to action for its users, strongly recommending the immediate update of both computer software and router firmware. This crucial advisory stems from the identification of a severe security flaw that could potentially expose millions of devices worldwide to malicious actors. The company has acted swiftly to patch a critical privilege escalation vulnerability within its MyASUS application, a ubiquitous piece of software pre-installed on all Asus computers.

Exploiting the MyASUS Flaw: A Gateway for Attackers

The vulnerability, designated CVE-2025-59373, presents a significant risk as it allows attackers with even limited access to gain elevated privileges on a user's system. This means that a seemingly innocuous user could, if the vulnerability is exploited, gain control equivalent to that of a system administrator. The flaw resides within the Asus System Control Interface's recovery mechanism. As explained by Asus, the exploit can be triggered when an unprivileged user transfers files without proper validation into protected system directories. This negligence, even if unintentional on the user's part, could pave the way for the execution of arbitrary code with SYSTEM-level authority, a scenario no user wants to face.

The severity of this exploit cannot be overstated, evidenced by its high rating of 8.5 out of 10 on the Common Vulnerability Scoring System (CVSS). This critical flaw affects both ARM-based and traditional x64 architecture systems, making a broad spectrum of Asus devices vulnerable. The affected versions of the Asus System Control Interface are anything prior to 3.1.48.0 for x64 systems and 4.2.48.0 for ARM systems. Users can easily check their current version by navigating to MyASUS, then accessing Settings and 'About'.

A Two-Pronged Security Push: PCs and Routers

Asus has not only addressed the MyASUS vulnerability but has also released critical security updates for its router firmware. The MyASUS patch is readily available through Windows Update, or users can manually download it directly from the Asus Support website. This update is comprehensive, covering all Asus personal computers, including desktops, laptops, NUCs, and All-in-One models. The company's proactive stance aims to safeguard a vast user base from potential data breaches and system compromises.

Parallel to the PC software update, Asus is urging customers to immediately update the firmware on their Asus routers. This router firmware patch tackles several security weaknesses, with the most alarming being an authentication bypass in AiCloud. This bypass could allow unauthorized access to specific functionalities, a worrying prospect for home and small business networks. Asus is also providing a stark warning for owners of older router models that are no longer officially supported. These devices will not receive the vital security updates. For such users, Asus strongly recommends disabling all internet-facing services, including AiCloud, remote WAN access, port forwarding, DDNS, VPN server, DMZ, Port Triggering, and FTP, to mitigate risks.

A Pattern of Proactive Security Measures

This latest security initiative from Asus follows closely on the heels of another significant fix. Just two months prior, the company concluded a lengthy investigation into persistent freezing issues plaguing its ROG laptop series, ultimately resolving the bug with a BIOS update. This demonstrates a commitment from Asus to address user concerns and maintain the security and functionality of its product ecosystem, reinforcing trust among its global customer base.

Windows 11 25H2 update moves to Release Preview, signaling imminent broad launch
Post is written using materials from / cybernews /

Thanks, your opinion accepted.

Comments (0)

There are no comments for now

Leave a Comment:

To be able to leave a comment - you have to authorize on our website

Related Posts