ASUS DriverHub Vulnerability: Hackers Can Take Over Your PC via Website
Автор: Security Daily Review
Загружено: 2025-05-13
Просмотров: 322
A critical vulnerability in ASUS DriverHub put millions of systems at risk — and it’s worse than ASUS admits.
Security researcher MrBruh (Paul) discovered two high-severity flaws now tracked as CVE-2025-3462 and CVE-2025-3463. The first allowed malicious websites to bypass origin checks using a domain trick, giving them access to a local RPC service on port 53000. The second exploited improper certificate validation to silently install malware with SYSTEM privileges via ASUS's own signed installer.
Attackers could hijack your PC with a single click, using a fake subdomain and a malicious .ini file.
ASUS released a fix in DriverHub version 1.0.6.0 on May 9, 2025 — but you have to manually trigger the update from inside the app.
ASUS says only motherboards are affected. Researchers say that’s false — laptops, desktops, anything with DriverHub installed could be vulnerable. If it came with your BIOS, it may already be running silently.
Update now. Don't wait. This is a full system compromise from just one click.
📌 CVE-2025-3462: Origin check bypass (CVSS 8.4)
📌 CVE-2025-3463: Code execution via installer abuse (CVSS 9.4)
🔐 Stay safe. Patch now.
#ASUS, #DriverHub, #Cybersecurity, #CVE20253462, #CVE20253463, #PrivilegeEscalation, #ZeroDay, #SystemVulnerability, #SecurityAlert, #Exploit, #PatchNow, #InfoSec, #WindowsSecurity, #Hacking, #SystemCompromise
FIND US AT
https://dailysecurityreview.com/
FOLLOW US ON SOCIAL
Get updates or reach out to Get updates on our Social Media Profiles!
Twitter: / securitydailyr
Facebook: https://www.facebook.com/profile.php?...
LinkedIn: / security-daily-review

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: