Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA reports critical flaw in ASUS Live Update following evidence of active exploitation
Identity

CISA reports critical flaw in ASUS Live Update following evidence of active exploitation

userBy userDecember 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 18, 2025Ravi LakshmananVulnerabilities/Software Security

The US Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw affecting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), is described as “embedding a malicious code vulnerability” introduced by a supply chain compromise, which could allow an attacker to perform unintended actions.

“Certain versions of the ASUS Live Update client were distributed with unauthorized changes introduced through a supply chain compromise,” according to the flaw description published on CVE.org. “The modified build may cause unintended behavior on devices that meet certain targeting conditions. Only devices that meet these conditions and have installed the compromised version are affected.”

It’s worth noting that this vulnerability refers to a supply chain attack that was revealed in March 2019, when ASUS admitted that the Advanced Persistent Threat (APT) group had compromised some of its servers as part of a campaign codenamed “Operation ShadowHammer” by Kaspersky Lab. This activity is said to have been carried out from June to November 2018.

cyber security

The Russian cybersecurity firm said the aim of the attack was to “surgically target” an unknown group of users whose machines were identified by the MAC address of their network adapter. The trojanized version of the artifact contained a hardcoded list of over 600 unique MAC addresses.

ASUS noted at the time that “a sophisticated attack on our Live Update servers resulted in malicious code being implanted on a small number of devices in an attempt to target a very small and specific group of users.” This issue was fixed in Live Update software version 3.6.8.

This development comes weeks after ASUS officially announced that its Live Update client has reached end of support (EOS) on December 4, 2025. The final version is 3.6.15. As a result, CISA has asked Federal Civilian Executive Branch (FCEB) agencies that still rely on this tool to cease using it by January 7, 2026.

“ASUS is committed to software security and continually provides real-time updates to help protect and harden your devices,” the company said on its support page. “Automatic, real-time software updates are available via the ASUS Live Update application. To resolve security issues, please update ASUS Live Update to V3.6.8 or a later version.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCisco warns of active attack exploiting unpatched zero-day in AsyncOS email security appliances
Next Article Kimsuky spreads DocSwap Android malware via QR phishing disguised as a distribution app
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.