Critical ASUS DriverHub Flaws Allow Remote Code Execution
EC
Overview
ASUS has patched two severe vulnerabilities in its DriverHub utility—CVE-2025-3462 and CVE-2025-3463—that could be exploited together to bypass origin checks and achieve remote code execution (RCE) with administrative privileges. The flaws, disclosed by independent security researcher “Paul” (a.k.a. MrBruh), affected systems running the pre-installed ASUS DriverHub utility found on many ASUS motherboards.

Vulnerability Breakdown
CVE-2025-3462 – Origin Header Validation Bypass
This flaw stems from improper validation of the HTTP Origin header in DriverHub’s background service, which listens on port 53000. Though the service was designed to only accept requests from the official domain (driverhub.asus.com), it mistakenly accepted requests from any domain containing that string, such as driverhub.asus.com.attacker.com. This oversight allowed malicious websites to interact with the service via crafted cross-origin requests.
CVE-2025-3463 – Certificate Validation Weakness
This vulnerability involved inadequate verification of digital certificates in the communication between DriverHub and the ASUS backend. The flaw allowed an attacker to spoof certificate-based trust and trick the application into accepting and executing malicious instructions delivered via forged HTTP requests.
Combined Exploitation: Origin Bypass to RCE
When chained, these vulnerabilities enabled threat actors to craft malicious web pages that could send privileged commands to the local DriverHub service without user awareness. If a victim visited such a website, it could lead to:
- Arbitrary command execution as SYSTEM
- Full system compromise without downloading any files
- Exploitation with minimal user interaction
Because DriverHub runs in the background and users may not even know it's installed, the exploit surface is broad and stealthy.
ASUS’s Mitigation and User Guidance
ASUS responded by releasing security patches and urging users to update DriverHub immediately. The company confirmed that the flaws have been resolved in the latest version.
Recommendations for Users:
- Check for Updates: Ensure that DriverHub is updated to the latest version provided by ASUS.
- Monitor Network Activity: Be vigilant for unusual network behavior, which could indicate exploitation attempts.
- Limit Exposure: Consider disabling or uninstalling DriverHub if it's not essential for your system's operation. This must be done from BIOS settings.

Conclusion
These vulnerabilities underscore the risks posed by background utilities that maintain elevated privileges and expose network-accessible services. ASUS users should treat this as a high-priority security issue and take remediation steps without delay. Zero-day vulnerabilities such as these can be difficult to handle for small and medium businesses, that's where TechHorizon Consulting can help. With our vCISO service we can provide real-time network monitoring and can help your business keep up with the newest vulnerabilities. If this interests you, or your small to medium business please visit our "Contact Us" page.