Two critical vulnerabilities, CVE-2025-3462 and CVE-2025-3463, have been discovered in ASUS DriverHub, a utility designed to help users update drivers on ASUS systems. These flaws could be exploited by malicious actors to execute unauthorized commands with elevated privileges. The issues stem from insufficient origin validation and improper certificate handling in HTTP requests, potentially allowing attackers to manipulate system behavior from untrusted sources. Given the popularity of ASUS tools across consumer and enterprise environments, users are urged to apply the available security patches immediately.
ASUS DriverHub, a background driver management service shipped with ASUS motherboards and systems, was found vulnerable to critical remote code execution (RCE) via insecure local RPC communications. The DriverHub service listens locally on port 53000 and receives instructions from a companion ASUS web application (driverhub.asus.com) through HTTP requests.
CVE-2025-3462 highlights an origin validation flaw where the service only verifies whether the Origin HTTP header includes driverhub.asus.com. It fails to perform strict hostname validation (e.g., exact match or certificate pinning). As a result, attackers can register deceptive subdomains like driverhub.asus.com.attacker.com to bypass the validation.
This means that any website crafted with such a subdomain could send privileged commands to the DriverHub service running on a user’s machine, assuming the user visits the malicious site.
CVE-2025-3463, a certificate validation flaw, allows the system to trust executables fetched from external sources even if they’re signed by rogue or improperly validated certificates. The signature verification accepts any executable signed by ASUS, not necessarily issued through official channels. This opens a door for attackers to repackage ASUS-signed installers with malicious payloads.
Proof of Exploit Chain:
Historical Context:
If exploited, these vulnerabilities could allow attackers to run code with administrative privileges giving them the keys to the system. From silently installing malware to stealing data or taking full control of the affected computer, the consequences are severe. What’s particularly concerning is that the user might not even be aware anything is wrong just visiting the wrong website could be enough to trigger an attack. In enterprise environments, such weaknesses could become a gateway for broader network infiltration.
https://mrbruh.com/asusdriverhub/