Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Asus Driverhub Flaw allow malicious sites to run command with administrator rights
    Security

    Asus Driverhub Flaw allow malicious sites to run command with administrator rights

    PineapplesUpdateBy PineapplesUpdateMay 13, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Asus Driverhub Flaw allow malicious sites to run command with administrator rights
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Asus Driverhub Flaw allow malicious sites to run command with administrator rights

    Asus driverhub driver management utility was unsafe for an important remote code execution defects that allowed malicious sites to execute the command on equipment with installed software.

    The defect was discovered by an independent cyber security researcher from New Zealand, named Paul (aka “.Mrbruh“), Who found that the software had poor recognition of orders sent to the driver’s background service.

    This allowed the researcher to create an exploitation series Cve-2025-3462 And Cve-2025-3463 When jointly, the original bypass is obtained and triggers remote code execution on the target.

    Driverhub problem

    Driverhub Asus has an official driver management tool that is automatically installed on the system boot when using some Asus motherboard.

    It runs in the software background, automatically detected and receives the latest driver versions for the motherboard model and its chipset.

    Once installed, the tool remains active and running in the background through a local service at Port 53000, constantly checking for important driver updates.

    Meanwhile, most users do not even know that such service is constantly running on their system.

    This service examines the original header of the upcoming HTTP requests, which is to reject anything that does not come from ‘Driverhub.asus.com’.

    However, this check is poorly applied, as any site is included that string, even if it is not an accurate match for the official portal of ASUS.

    The second issue lies in updateapp endpoint, which allows the driver to download and run.

    BIOS settings related to Driverhub (active by default)
    BIOS Settings related to Driverhub (enabled by default)
    Source: Mrbruh

    Sneaky attack

    An attacker can target any user to visit a malicious website on his browser running on his system with Asus Driverhub. This website then sends “updateapp request” for local service

    The original header is bypassed for the investigation of weak verification by spuofing for something like ‘Driverhub.asus.com.Mrbruh.com’, hence the driverhub accepts the command.

    In the performance of the researcher, the command software orders a valid asus-signed ‘Asussetup.exe’ installer a malicious .INI file and a valid asus-signed ‘signed’ assetstup.exe ‘installer with a malicious .IXE file and .exe payload.

    Asus-signed installer is silently run as administrator and uses configuration information in .INI file. This INI file directs the valid asus driver installer to launch malicious executable file.

    The attack has also been made possible that fails to remove the files that thwart the signature check, such as .IINI and Paleod, which are placed on the host after their download.

    Asus reaction and user action

    Asus received the researcher’s report on 8 April 2025, and applied a fix on 18 April, which was a day earlier after being validated with Mrbruh. The hardware giant did not give a reward to the researcher for his disclosure.

    The CVE description, which was presented by the seller of Taiwan, reduces this issue with some extent the following statement:

    “The issue is limited to the motherboard and does not affect laptops, desktop computers or other closing points,” CVE reads the details.

    It is misleading, as the Driverhub is installed with the mentioned Caves effect laptops and desktop computers.

    However, Asus is clear in its safety bulletin, advises users to apply the latest updates quickly.

    “This update involves significant security updates and asus strongly recommends that users update their Asus Driverhub installation in the latest version,” Bulletin reads,

    “The latest software updates can be accessed by opening the Asus Driverhub, then clicking on the” Update Now “button.”

    Mrbruh says that he monitored the certificate transparency update and found no other TLS certificate containing “Driverhub.asus.com” string, showing that it was not exploited in the wild.

    If you are uncomfortable with a background service, to automatically bring the potentially dangerous files when going to the websites, you can disable the driverhub from your BIOS settings.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    administrator Asus command Driverhub Flaw malicious rights run sites
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRansomware can attack your CPU, not only your OS: How to be ready
    Next Article Sakana introduced new AI architecture, ‘continuous thought machines’ to make models a reason with low guidance – like human mind
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    I Found the Best Way to Run an Internet Speed ​​Test (And Use the Results for Better Wi-Fi)

    January 19, 2026
    Startups

    A new earbud security flaw could leave you a victim of remote spying – here’s how to fix it

    January 18, 2026
    Startups

    My Favorite Linux Search Tools Make It Easy to Find Your Files – No Command Line Required

    December 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.