CISA warns ASUS Live Update backdoor is still exploitable, seven years on
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我先通读一下文章。 文章主要讲的是ASUS Live Update这个工具被发现存在漏洞,被CISA加入到了已知被利用的漏洞目录中。这个漏洞的CVSS评分是9.3,属于高危。之前在2019年和2018年都发生过类似的攻击事件,都是通过供应链攻击植入后门。 现在CISA指出,如果满足某些条件,受影响的设备可能会执行未授权的操作。ASUS已经停止了对Live Update的支持,建议用户更新到3.6.8或更高版本,并提供了下载和安装的步骤。 用户的需求是希望得到一个简洁的总结,所以我要抓住关键点:ASUS Live Update漏洞被CISA列为高危,影响设备更新功能,曾被多次攻击利用,建议用户更新到最新版本以修复问题。 接下来我要把这些信息浓缩到100字以内,确保语言简洁明了。 </think> ASUS Live Update工具被发现存在高危漏洞(CVE-2025-59374),可被用于恶意代码植入。该漏洞已被CISA列为已知被利用的漏洞,并要求限期修复。此前该工具曾多次遭供应链攻击利用。建议用户更新至最新版本以修复问题。 2025-12-19 13:56:36 Author: www.malwarebytes.com(查看原文) 阅读量:2 收藏

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) added (along with two others) a vulnerability in ASUS Live Update to its catalog of Known Exploited Vulnerabilities (KEV).

The KEV catalog lists vulnerabilities that are known to be exploited in the wild and sets patch deadlines for Federal Civilian Executive Branch (FCEB) agencies. When CISA adds an issue to this list, it’s a strong signal that exploitation is real, ongoing, and urgent.

The ASUS Live Update Embedded Malicious Code vulnerability, tracked as CVE-2025-59374 (with a CVSS score of 9.3), affects Live Update, a utility commonly used to deliver firmware and software updates to ASUS devices.

This isn’t the first time ASUS Live Update has been linked to serious security incidents. In 2019, ASUS responded to media reports about attacks on the Live Update tool by advanced persistent threat (APT) groups, stating that:

“A small number of devices have been implanted with malicious code through a sophisticated attack on our Live Update servers in an attempt to target a very small and specific user group.”

Later investigations revealed that a sophisticated supply chain attack mounted in 2018, attributed to Chinese state-sponsored attackers, had inserted a backdoor into ASUS Live Update. The attack was particularly effective because that utility came preinstalled on most ASUS devices and was used to the automatically update BIOS, UEFI, drivers, and other components.

CISA now notes that the affected devices could be abused to perform unintended actions if certain conditions are met. Originally, the attackers reportedly targeted only around 600 specific devices, based on hashed MAC addresses hardcoded in various versions of the tool. This was despite the fact that millions of users may have downloaded the backdoored utility.

Support for the ASUS Live Update application has since been discontinued. The final intended version of ASUS Live Update was 3.6.15, but it will continue to provide software updates. This is likely why a CVE was assigned and why the vulnerability was added to the KEV catalog. There was no official “why now” statement from ASUS, MITRE, or CISA, but the timing aligns with a legacy, end-of-support product being reclassified as a vulnerability with confirmed active exploitation.

What do ASUS users need to do?

First of all, make sure you’re running a clean version of the utility. ASUS urges users to update to version 3.6.8 or later to address known security issues.

  • Right-click the ASUS Live Update icon at the bottom-right corner of your Windows screen
  • Click About to see the version information as the shown in the picture below.
    check version ASUS live update
  • If you are on an older version, open the program and click Check update immediately
  • ASUS Live Update will automatically find the latest driver and utility.
  • Click Install
  • After updating, recheck and ensure it shows “No updates.”

Alternatively, you can download and install the latest version manually. ASUS’ own support article describes the only official way to get the current Live Update package:​

  1. Go to the ASUS Official Website (asus.com)
  2. Use the search box to find your exact model (e.g., UX580GD)
  3. Open the product page and click Support → Driver & Tools
  4. Select your operating system (e.g., Windows 10/11 64-bit).​
  5. In the Utilities section, locate ASUS Live Update and click Download

This is as close as we could get you to a “direct” official download. The URL is different for every model and ASUS does not provide a central Live Update installer directory. While this makes it harder than it maybe should be, we do recommend using this official download. Given the history of supply chain abuse involving this tool, downloading it from third-party sources is a risk not worth taking.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2025/12/cisa-warns-asus-live-update-backdoor-is-still-exploitable-seven-years-on
如有侵权请联系:admin#unsafe.sh