ASUS has recently identified a critical security vulnerability within its MyASUS application, designated as CVE-2025-59373. This flaw enables local attackers to escalate their privileges to SYSTEM-level access on affected Windows devices, posing a significant risk to users worldwide.
Understanding the Vulnerability
The issue resides in the ASUS System Control Interface Service, a fundamental component of the MyASUS application responsible for managing hardware settings and system utilities on ASUS personal computers. By exploiting this vulnerability, attackers with initial low-level local access can elevate their privileges to SYSTEM-level, granting them complete control over the compromised machine.
Potential Impact
Achieving SYSTEM-level access allows threat actors to execute arbitrary code, install malware, access sensitive data, modify system configurations, and potentially move laterally across enterprise networks. This makes the vulnerability particularly dangerous in corporate environments, where a single compromised endpoint could lead to broader network intrusion.
Exploitation Details
To exploit this vulnerability, an attacker must have local access to the target system. However, the attack complexity is low, requires no user interaction, and only minimal privileges are needed to trigger the exploit. The potential impact spans high confidentiality, integrity, and availability concerns, though the scope remains unchanged beyond the vulnerable component.
Affected Systems
The vulnerability affects all ASUS personal computers running the MyASUS application, including desktops, laptops, NUC systems, and All-in-One PCs. ASUS has released patched versions to address the issue.
Mitigation Measures
ASUS has promptly released security patches to address this vulnerability. Users are strongly advised to update to the following fixed versions immediately:
– ASUS System Control Interface 3.1.48.0 for x64 systems
– ASUS System Control Interface 4.2.48.0 for ARM-based devices
To verify the current installed version, users can navigate to MyASUS, then select Settings and click About to view the version information.
Recommendations for Users
ASUS urges all users to apply the security update as soon as possible. The update can be obtained through Windows Update, which will automatically deliver the patch to eligible systems.
Recommendations for Organizations
Organizations running ASUS devices across their networks should prioritize deploying this patch given its high severity rating and the potential for privilege-escalation attacks. Security teams should also monitor systems for any suspicious activity that could indicate exploitation attempts.
Conclusion
The discovery of CVE-2025-59373 underscores the critical importance of timely software updates and vigilant security practices. By promptly applying the provided patches and adhering to recommended security measures, users and organizations can effectively mitigate the risks associated with this vulnerability.