[German]Brief information for readers who use ASUS Armoury Crate on their Windows systems. The vulnerability CVE-2025-3464 in the software allows an attacker to gain administrator privileges under Windows. ASUS has since updated the software to close the vulnerabilities.
Armoury Crate is a centralized software application developed by ASUS to manage and customize the settings of ASUS hardware components and peripherals. It provides users with a unified interface to control various functions such as RGB lighting, system performance, fan speeds and device configurations.
In this software, Talos found the vulnerability CVE-2025-3464 in the driver AsIO3.sys. The driver AsIO3.sys creates a device called Asusgio3. The vulnerability, classified as High with a CVS 3.1 index of 8.4, is caused by a race condition (time-of-check-time-of-use problem) in the AsIO3.sys file. This can lead to an authentication bypass.
According to Talos, a specially crafted hardlink can lead to a bypass of authorization. The file AsIO3.sys of Asus Armoury Crate 5.9.13.0 is affected. According to ASUS, the vulnerability CVE-2025-3464 affects software versions between V5.9.9.0 and V6.1.18.0.
ASUS has released a software update for the Armoury Crate system management software effective June 16, 2025, according to this website. This update contains important security updates, and ASUS strongly recommends that users update their Armoury Crate installation to the latest version. Users can get the latest software update by opening Armoury Crate, going to the Settings tab > Update Center and clicking Check for Updates. Then select Update on ARMOURY CRATE if the new version is available. (via)