Connect with us

Security

Not all ASUS Live Update Alerts are Critical: Understanding CVE-2025-59374

Published

on

The Truth Behind the ASUS Live Update CVE-2025-59374

Reports of a vulnerability in ASUS Live Update, known as CVE-2025-59374, have been circulating in the cybersecurity community, sparking concerns about potential exploitation. However, a closer examination reveals that this vulnerability is not a new threat but rather a historical supply-chain attack on an End-of-Life (EoL) software product.

Decoding CISA’s Known Exploited Vulnerabilities

The recent coverage of CVE-2025-59374 has portrayed it as a current security risk due to its inclusion in CISA’s Known Exploited Vulnerabilities catalog. Nevertheless, the reality is more nuanced than sensational headlines suggest.

The CVE documents the “ShadowHammer” supply-chain attack that occurred between 2018 and 2019, where maliciously altered ASUS Live Update binaries were distributed to a select group of targeted systems.

The severity of the compromise, now rated as a 9.3 (Critical) on the CVSS scale, is highlighted in the CVE entry:

“UNSUPPORTED WHEN ASSIGNED” Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.

The designation “unsupported when assigned” clearly indicates that the CVE pertains to an EoL product.

The primary vendor advisory linked in the CVE entry dates back to 2019 and includes a link to an FAQ page with the last updated timestamp of December 6, 2025.

ASUS 2019 advisory on ShadowHammer attack
ASUS 2019 advisory on ShadowHammer attack (BleepingComputer)

Despite recent updates to the FAQ page, the absence of original publication dates suggests that the page serves as a repository of information rather than an indicator of renewed risk.

ASUS FAQ updated in December 2025
ASUS FAQ updated in December 2025 doesn’t show original publication date
(BleepingComputer)

Upon scrutiny, it becomes evident that the FAQ page serves as a reference point for users seeking guidance on upgrading the ASUS Live Update utility.

See also  Windows 11 Boot Failures Linked to Failed December 2025 Update: What You Need to Know

For more insights on the CVE assignment, ASUS and CISA were approached for comments, with CISA referring to Binding Operational Directive 22-01, which clarifies the criteria for inclusion in the Known Exploited Vulnerabilities catalog.

“Addition of a vulnerability to the KEV catalog does not indicate that CISA is observing current active exploitation. If there is accurate reporting of active exploitation, any vulnerability, despite its age, can qualify for KEV catalog addition”

Navigating the ASUS Live Update Vulnerability

Despite the historical context of CVE-2025-59374, users are advised to ensure they are using the latest patched version of the affected software. ASUS Live Update reached End-of-Support in October 2021, with no currently supported devices impacted by the issue.

The updated FAQ from December 2025 mentions the end of support on December 4, 2025, indicating version 3.6.15 as the final release. However, previous versions of the FAQ recommended upgrading to version 3.6.8 or higher to address security concerns.

ASUS FAQ updated in 2025 still mentions older advice
ASUS FAQ updated in 2025 still mentions older upgrade advice beneath the updated instructions
(BleepingComputer)

The release of version 3.6.15, although mentioned in the recent FAQ update, has been available since March 2024, indicating no immediate urgency for upgrades.

CVE-2025-59374 serves as a retrospective classification of a well-known attack, with FAQ updates and CISA’s context shedding light on the documentation-driven nature of recent updates.

Security teams are advised to exercise caution when reacting to CISA-linked CVEs, especially concerning outdated software or resolved incidents.

Trending