CVE-2025-59374
Published: 17 December 2025
Description
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met…
more
these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
Mitigating Controls (NIST 800-53 r5)AI
Prohibits use of end-of-support system components like the ASUS Live Update client, directly preventing deployment of supply chain compromised EOS versions.
Requires verification of component authenticity to block installation of tampered ASUS Live Update builds from supply chain compromises.
Deploys malicious code protection mechanisms to prevent execution and detect embedded malicious code (CWE-506) in compromised client versions.
Security SummaryAI
CVE-2025-59374 involves a supply chain compromise in certain versions of the ASUS Live Update client, which were distributed with unauthorized modifications. These altered builds could cause devices meeting specific targeting conditions to perform unintended actions, classified under CWE-506 (Embedded Malicious Code). Only devices that satisfied these conditions and installed the compromised versions were affected. The Live Update client reached End-of-Support in October 2021, and no currently supported ASUS devices or products are impacted.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), enabling remote exploitation over the network with low complexity, no privileges, and no user interaction. Attackers leveraging the supply chain compromise could target qualifying devices through the modified client, achieving high impacts on confidentiality, integrity, and availability by triggering unintended actions on those systems.
ASUS has issued details via their news advisory at https://www.asus.com/news/hqfgvuyz6uyayje1/, and the issue appears in the CISA Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59374. Given the end-of-support status, no patches are available; mitigation requires verifying that compromised versions are not installed on any legacy devices meeting the targeting conditions.
Details
- CWE(s)
- KEV Date Added
- 17 December 2025
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE describes a supply chain compromise via unauthorized modifications to ASUS Live Update client builds (CWE-506 Embedded Malicious Code), directly enabling T1195.002: Compromise Software Supply Chain.