The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59374

CVE-2025-59374: Asus Live Update Supply Chain Vulnerability

CVE-2025-59374 involves a supply chain compromise in Asus Live Update where unauthorized modifications enabled targeted attacks. This article covers the technical details, affected versions, impact, and mitigation steps.

Published: March 11, 2026

CVE-2025-59374 Overview

CVE-2025-59374 describes a critical supply chain compromise affecting certain versions of the ASUS Live Update client. Unauthorized modifications were introduced into legitimate software builds, causing devices meeting specific targeting conditions to perform unintended actions. This vulnerability is particularly concerning as it represents a sophisticated attack that leveraged trusted software distribution channels to deliver malicious code.

The compromised ASUS Live Update client was distributed through official channels, making detection extremely difficult for end users. The attack specifically targeted devices meeting certain criteria, suggesting a highly targeted operation rather than widespread opportunistic exploitation. While the Live Update client reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected, this CVE serves as an important documentation of the supply chain compromise.

Critical Impact

Devices that installed compromised versions of ASUS Live Update could execute attacker-controlled code with elevated privileges, potentially leading to complete system compromise. This vulnerability is listed in the CISA Known Exploited Vulnerabilities Catalog, confirming active exploitation in the wild.

Affected Products

  • ASUS Live Update (all versions prior to End-of-Support in October 2021)
  • Windows-based ASUS devices utilizing the Live Update utility
  • Systems that installed compromised software builds during the attack window

Discovery Timeline

  • 2025-12-17 - CVE-2025-59374 published to NVD
  • 2025-12-18 - Last updated in NVD database

Technical Details for CVE-2025-59374

Vulnerability Analysis

This vulnerability represents a supply chain attack (CWE-506: Embedded Malicious Code) where threat actors successfully compromised the ASUS software build and distribution infrastructure. The attackers injected malicious code into legitimate ASUS Live Update binaries before they were signed and distributed to users. Because the malicious updates were signed with valid ASUS certificates, the compromised software appeared completely legitimate to both users and security software.

The attack was highly targeted, with the malicious payload checking device identifiers against a hardcoded list before executing its malicious functionality. Only devices matching specific MAC addresses or other hardware identifiers would trigger the malicious behavior, allowing the attackers to focus on high-value targets while maintaining a low profile.

Root Cause

The root cause of this vulnerability stems from a compromise of ASUS's software supply chain infrastructure. Attackers gained access to the build or distribution system, enabling them to inject malicious code into software updates that were then digitally signed with legitimate ASUS certificates. This allowed the backdoored updates to bypass security controls that rely on code signing verification.

The embedded malicious code (CWE-506) was designed to:

  1. Check device identifiers against a targeting list
  2. Download additional payloads from attacker-controlled infrastructure
  3. Execute arbitrary commands on targeted systems

Attack Vector

The attack vector leverages the network-based software update mechanism of ASUS Live Update. Users who had the Live Update client installed would automatically download and install the compromised updates, trusting the valid digital signature. The attack required no user interaction beyond normal software update behavior.

The malicious functionality within the compromised updates would:

  1. Check targeting conditions - The malware examined device-specific identifiers (such as MAC addresses) against an embedded list
  2. Establish persistence - On targeted systems, the malware would install additional components for persistence
  3. Contact C2 infrastructure - Compromised systems would reach out to attacker-controlled servers to receive further instructions or payloads
  4. Execute payloads - Attacker-specified code would be executed with the privileges of the ASUS Live Update service

Detection Methods for CVE-2025-59374

Indicators of Compromise

  • Presence of ASUS Live Update versions distributed during the compromise window with anomalous file hashes
  • Network connections to known command-and-control infrastructure associated with this campaign
  • Unexpected processes spawned by ASUS Live Update components
  • Registry modifications or scheduled tasks created by compromised Live Update binaries

Detection Strategies

  • Compare hashes of installed ASUS Live Update binaries against known-good and known-compromised hash lists published by ASUS
  • Monitor for network traffic to indicators of compromise associated with this supply chain attack
  • Review endpoint logs for suspicious behavior patterns from processes associated with ASUS system utilities
  • Deploy behavioral detection rules to identify software update processes exhibiting anomalous command execution

Monitoring Recommendations

  • Implement network monitoring for connections to known malicious infrastructure associated with this campaign
  • Enable enhanced logging for system processes, particularly those related to software updates
  • Review historical DNS queries and network connections from systems that may have had ASUS Live Update installed
  • Configure endpoint protection to alert on targeting indicators specific to this supply chain compromise

How to Mitigate CVE-2025-59374

Immediate Actions Required

  • Verify that ASUS Live Update is no longer installed or has been updated to a clean version using ASUS diagnostic tools
  • Run the official ASUS Security Diagnostic Tool to check if your system was affected by the compromised software
  • Perform a comprehensive security scan on systems that may have installed compromised versions
  • Review network logs for connections to known malicious infrastructure and investigate any matches

Patch Information

ASUS has released updated versions of their software and diagnostic tools to address this supply chain compromise. According to the ASUS News Release, users should:

  1. Download and run the ASUS Security Diagnostic Tool to verify system integrity
  2. Ensure all ASUS software is updated to the latest clean versions
  3. Note that ASUS Live Update has reached End-of-Support (EOS) as of October 2021 and should be removed from systems

This vulnerability is tracked in the CISA Known Exploited Vulnerabilities Catalog, indicating organizations subject to CISA directives must prioritize remediation.

Workarounds

  • Completely uninstall ASUS Live Update from affected systems, as the software has reached End-of-Support
  • Block network indicators associated with this supply chain attack at the perimeter firewall
  • Implement application allowlisting to prevent execution of compromised binaries
  • Consider reimaging systems confirmed to have installed compromised versions to ensure complete remediation
  • Enable Windows Defender Application Control or similar solutions to prevent execution of unsigned or malicious code

For systems where the ASUS Live Update client cannot be immediately removed, implement network-level blocks to prevent communication with known command-and-control infrastructure. Consult the ASUS security advisory for specific file hashes and network indicators to block.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechAsus Live Update

  • SeverityCRITICAL

  • CVSS Score9.3

  • EPSS Probability31.79%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-506
  • Technical References
  • CISA Known Exploited Vulnerabilities Catalog
  • Vendor Resources
  • ASUS News Release
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English