Tech »  Topic »  Asus Armoury Crate Vulnerability Leads to Full System Compromise

Asus Armoury Crate Vulnerability Leads to Full System Compromise


A high-severity authorization bypass vulnerability in Asus Armoury Crate provides attackers with low-level system privileges.

Asus on Monday announced patches for a high-severity vulnerability in the Armoury Crate management software that could lead to full system compromise.

Tracked as CVE-2025-3464 (CVSS score of 8.8), the bug is described as an authorization bypass rooted in a Time-of-check Time-of-use issue.

According to Cisco Talos, which identified the flaw, an attacker can trigger the security defect by creating a crafted hard link and bypass authorization to an Armoury Crate-specific driver.

A centralized application, Armoury Crate is used for the management of hardware components and peripherals, offering various device configuration, driver and firmware update, RGB illumination, and system performance capabilities.

CVE-2025-3464 is related to the AsIO3.sys virtual driver that Armoury Crate uses for certain functionality, and the Asusgio3 device the driver creates.

For protection purposes, access to the driver is limited to ...


Copyright of this story solely belongs to securityweek . To see the full text click HERE