ASUS Product Security Advisory

PG

ASUS Banner

ASUS Product Security Advisory

We take every care to ensure that ASUS products are secure in order to protect the information security privacy of our valued customers. We constantly strive to improve our safeguards for security and personal information in accordance with all applicable laws and regulations, and we welcome all reports from our customers about product-related security or privacy issues. ASUS strives to adhere to the principles of Coordinated Vulnerability Disclosure (CVD) and actively collaborates with partners to address potential vulnerabilities. Any information you supply to ASUS will only be used to help resolve the security vulnerabilities or issues you have reported. This process may include contacting you for further relevant information. Once the vulnerability report is confirmed, ASUS will notify the submitter as soon as possible and provide timely updates on the handling status.

ASUS PSIRT Participation

ASUS places a high priority on the security of its products and services. We understand that security is not a one-time effort, but a continuous commitment. Therefore, ASUS continues to work closely with industry partners, academic researchers, and cybersecurity experts, adhering to the best practices outlined in ISO 29147:2018 and ISO 30111:2019 for vulnerability management and handling, while also seeking new ways to enhance the security of our products. As a partner in the CVE Numbering Authority (CNA) program, ASUS follows Coordinated Vulnerability Disclosure (CVD) best practices to ensure timely and responsible resolution of any reported security issues. Additionally, as a member of the Forum of Incident Response and Security Teams (FIRST), ASUS adheres to the PSIRT Framework to systematically address potential security issues reported to ASUS. We encourage customers to take critical security measures, such as following best security practices, keeping products updated, and applying the latest firmware and software patches to ensure that ASUS products always provide a secure and reliable experience.

first-member-RGB cveLogo

Latest Security Updates

Title Type Affected Products CVE Published Date Last Updated
Security Update for Armoury Crate App Security Bulletin affect versions prior to V5.9.9.0 ~ V6.1.18.0 CVE-2025-3464 06/16/2025 06/16/2025
Security Update for Armoury Crate App Security Bulletin affect versions prior to V6.1.13.0 CVE-2025-1533 05/12/2025 05/12/2025
Security Update for ASUS DriverHub Security Bulletin ASUS DriverHub CVE-2025-3462
CVE-2025-3463
05/09/2025 05/09/2025
BMC Security Update for AMI MegaRAC SPx Redfish vulnerability Security Bulletin PRO WS W790E-SAGE SE, PRO WS W680M-ACE SE, PRO WS WRX90E-SAGE SE, and Pro WS WRX80E-SAGE SE WIFI CVE-2024-54085 04/23/2025 04/23/2025
ASUS Router AiCloud vulnerability Security Bulletin 3.0.0.4_382 series 3.0.0.4_386 series 3.0.0.4_388 series 3.0.0.6_102 series CVE-2025-2492 04/18/2025 04/18/2025
Security Update for MyASUS Security Bulletin ASCI V1: Version 1.1.32.0 for Windows x64 devices
ASCI V3: Version 3.1.43.0 for Windows x64 devices
ASCI V3: Version 3.2.44.0 for ARM devices
CVE-2025-2027 03/27/2025 03/27/2025
Security Update for Armoury Crate App Security Bulletin affect versions prior to V5.9.9.0 CVE-2024-12957 01/23/2025 01/23/2025
ASUS Router AiCloud Vulnerability Security Bulletin 3.0.0.4_386、3.0.0.4_388、
3.0.0.6_102firmware
CVE-2024-12912
CVE-2024-13062
01/02/2025 01/02/2025
* To review security updates from before 2025, please visit: Here

Vulnerability Disclosure Policy

Responsible reporting guidelines:

ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:

  1. Do not attempt to access or modify any ASUS services, systems, products or software without authorization.
  2. Do not disclose, or modify, destroy or misuse any data you may discover.
  3. All information given to or received from any party relating to the reported issues must remain completely confidential.
  4. Please do not engage in DoS attacks or any destructive testing that may affect the confidentiality, integrity or availability of information and systems.
  5. Refrain from participating in social engineering or phishing activities targeting customers or employees.
  6. Requests for compensation regarding the time and resources spent verifying vulnerabilities, or for discovered vulnerabilities, will not be considered.

Excluded Submission Types

We always prioritize security and encourage researchers to submit all potential security issues. Each report will be carefully reviewed. However, the following vulnerabilities (including but not limited to) have a very low impact on the system or user security. ASUS will handle and respond to submissions at its discretion based on the circumstances.

  • Outdated software versions that contain known vulnerabilities in libraries (e.g., jQuery), leading to low-impact security risks
  • Inadequate rate limiting or the absence of CAPTCHA verification mechanisms
  • Missing or incomplete SPF, DMARC, or DKIM records
  • Cookies not properly configured with HTTPOnly or Secure flags
  • Vulnerabilities that only affect outdated or unpatched browsers, extensions, and other non-ASUS software
  • Automated tool reports based solely on tool-generated findings, without further analysis of the vulnerabilities
  • Exposure of publicly accessible files or directories (e.g., robots.txt)
  • Low-risk issues related to clickjacking or UI elements (e.g., problems that are only exploitable through clickjacking)
  • Displaying stack traces on error pages instead of generic error messages
  • Disclosure of technology or component information (e.g., PHP,ASP.NET usage)
  • Account or email enumeration with no significant impact on the security of ASUS services or products
  • Absence of non-mandatory security headers, where the lack does not lead to an exploitable vulnerability
  • Insufficient HTTP security settings, where the specific impact (such as data leakage or functionality abuse) cannot be demonstrated
  • Low-risk CSRF issues (e.g., login, logout, or minor unauthenticated cross-site request forgery vulnerabilities)

How to report a security vulnerability or issue to ASUS

We welcome all reports related to security incidents concerning ASUS. We invite you to contact us about such matters through our dedicated web form: http://www.stzgcm.com/securityadvisory. By submitting a vulnerability report, you acknowledge and accept ASUS's vulnerability submission policy.

To help us address your concerns quickly, please ensure you provide the following information on the website.

  1. Your full name and a means of contacting you. This can be an email address or any other preferred method we can use to get in touch with you.
  2. Full and detailed information about the issue you wish to report. This should include the following information, as applicable:
    • The name of the ASUS service(s) or system(s) that your concern relates to.
    • The name, description and version number of any affected ASUS software products.
    • A full and detailed description of the problem or issue, along with any background information that you believe is relevant, and any other pertinent information that may help us reproduce and/or resolve the issue. Finding Vulnerabilities (Problems) Step-by-Step Instructions for Reproducing the Vulnerability Technical Description of the Vulnerability (Including Proof of Concept, if possible) Potential Impact of the Vulnerability Any Other Information That Can Help Us Reproduce and Resolve the Issue
    • Methods for discovering vulnerabilities or issues
    • Detailed steps for reproducing the vulnerability
    • Technical description of the vulnerability (if possible, including proof of concept)
    • Potential impact of the vulnerability
    • Any additional information that could help us reproduce and resolve the issue

We encourage you to use encrypted communication to protect the confidentiality of your information. You can encrypt your report using the PGP public key provided below:

PGP Public Key

Valid until: 2025/11/6 Fingerprint: B336802655EF3AD23767440C86474747C219DE2D Key Identity: <security@stzgcm.com> -----BEGIN PGP PUBLIC KEY BLOCK----- mQGNBGcq2kUBDACg4lIBr4KEiB+PliLyUaANRCyQSFts+EXyiKZoECNwJtHf6lj/ /8MtExYyzwPufR5mcCFkCNhcncI8nElLShdXTgcrY5J1ASHMpbREzMeIiIMz9JzU Momd+wjF1O9n33zw+K3nlu+ffnN2vg8QFRuCFESMJFMTdoZuB7Hjc8wC9GAb5+SS j7VvSA+hI6NXlh/FhGtCsWzKZi0+R1fkvqTuvKkzndzn+0K0nG5MaRfkvM1XTR3L Nu4RP0xlmp9wJINl8PbWsYwSAEYZ5AvTqQ5ibbhaesg6aAs+oWb7ut/zOjjSLF4B QipPNaZ4i4IPeNbm0EUZnKpplACgsGEnUEslOkONnbuC0OtE4vVNFmnO2ACrzp5G iBpffuM7X5I1OdiSBpbwT/2r1XiVINg5tGDUxi/sdJJwjlsCQNB9WCiu2zDYYxt2 Cdhy/M8UaKAVD0JV9AXH0Gb58L1lzLnH4XDHDUmk7nTBdQtmCc9NA24XsVYFwjab Hhv1s4LVv6aaqDcAEQEAAbQhQVNVU19TZWN1cml0eSA8c2VjdXJpdHlAYXN1cy5j b20+iQHXBBMBCABBFiEEszaAJlXvOtI3Z0QMhkdHR8IZ3i0FAmcq2kUCGwMFCQHh QvsFCwkIBwICIgIGFQoJCAsCBBYCAwECHgcCF4AACgkQhkdHR8IZ3i3cHgv5ARjc HitNMpdYTdQD2nZ0slJ9W0GHkR0+Gmv88vsqTfSUvgsTYcJWwK5KV8AaX3USTozX ND9yExwgB1iHwSMf0rN1sLkeJ5rdMuzhSA9CiwLlnBzU7aCi4peghk6qncPjPo7S iZnXYJpzQ8NqFAXk1bFKJzmGN2dDNYRVoIvN6bm/8puVLynN2mZmrASzJm3Xo1C3 7CRMYXjHRcv4xJjoc6VrGTY0sgCl2kX0W1eg256FZBdvKdhMsAlqQuJ/k1mwbU7T fZmK9ynLlj39ge4+9UTcS1suXUZxX3usjddy2Oo0zS2UwWjFzL+7PDyogzb0qPOR v2SIS6ljpN8KDyAC4MNJNcp9d3bWqPd5PqbOVQ9kcFFDeW9XVxiVid/dnpBycO0C hUCEY05ax26ftOnfGBuxr+/txovnV0QtBLJd0WkhsysR3jzKuyApu5QqW7+PJeUQ D8BUrCz8bnYDyuYBHYA1VUFFRzvdcuN6ycXfjIKCbKqT1bIqhtkoBy+0v5ajuQGN BGcq2kUBDADOAHhOGIBOTqTt72wTgbKiPub9KC1ZWq/j9Rl1zfaeal8DA6fKGTWH SOMpX6BDcdnRedTj8MzSPEfIDBxNoJPwL+rhia8VQS5ycORhG4HhvfwipW8RrzIC /bSZG82kv0J+OhryHBGr78R1sexYd0PNdaEDpp+iKFGk7NgOujRgm9f6p/kzZDsY JunxVEAGCd1qj3fCzYKL7WGE2SeLuapr92IzIvd0ueaMMG/jk348ziXv+TgjdURv 7ey09c2LfM+cVZDRd30rTqhwWoO6Hwe0Kw9xJGogBkgZdulARnfZpRNIbpIX1JlY DOjEfHrGbn9rNLqYN45FbKCCsxrGwslCavAYHsZh/M+8fqTIMAKQFy1i2gEKdSXu mbT5rQgypzU4w6aFiApLbczt/P5qWTY643krvqu7IzPGPJFZemghMSewy6PFjIWo WQPltLbhqFYheaNeI/0ZE+nFrEKOfXmbwROK5PDA4HVXGkWpnZnUQd/IRKfXNZqV o4eKcRtbwFkAEQEAAYkBvAQYAQgAJhYhBLM2gCZV7zrSN2dEDIZHR0fCGd4tBQJn KtpFAhsMBQkB4UL7AAoJEIZHR0fCGd4t4PUMAJekhVABnjFSSEHpe427BrrkJ548 WV8N/t7M+uhqP7IlxSCPT1BlZbC2uOWmoO5ag1Y/KG1aifPS+K30R4Qf1Vz9pg7M HMdvCzjGuvd7iagFsvbO5YcDgDS5N/EN81FG6d7hGIGsE9e6/m5zAxeEoUjBYa3l wibXR6IiuZf0+mTbscUUdl0T78SLrYxZ4eRHYRAJNP3XlGFc13DkJ8pJeFN2bEaj Gv5r2oSm9/NyicTDzY8xTdzZPzjmDUW2GfbcqrwzlmUyF335pqFr4Kfewpvf75Ye xhQjURMDEyLw69OQftDRSWHyyjVVS9Vb3WDakWzJy4QzauaIk2dEhpslUirPyrRG FcSt9XgGa2gykH9jrx1q4CTpBEpjrOq4HaxlWHLGBA5BlBrO8VQB5pxashbiTHiv J30MI/OBEhqcNvcQYoa3qrLBweFm3P8Q60Z03lo0JuLnlEiNdepXoMvUBfAuYHZh iZj6zRLQQT+e7gLXWHxSLYMLf5Hb2MupVp4U9w== =apel -----END PGP PUBLIC KEY BLOCK-----

What happens next?

Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.

ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.

Hall of Fame

June

  • Jack from Numen Networks Labs, Singapore
  • Febin Mon Saji
  • Taha Yıldırım

May

  • Leon Jacobs from Orange Cyberdefense’s SensePost team
  • Shaber Tseng
  • Nanyu Zhong of VARAS@IIE
  • Yassine Damiri
  • Chanhee Park (@ch4rli3kop), Dongjoo Kim (@d05004), Myounghun Song (@songmh0614), Seonghun Park (@qkrtjdgns147) from Computer Systems Security Lab, School of Cybersecurity, Korea University
  • Krishna Yadav (@xrishnayadav)

April

  • Quinn Nguyen from PawnCS
  • MrBruh
  • Marcin 'Icewall' Noga

March

  • Thomas 'TKYN' Keefer

February

  • Marcin 'Icewall' Noga
  • leeya_bug
  • Mounir Elgharabawy

Disclaimer

All aspects of the ASUS PSIRT (Product Security Incident Response Team) processes and policies may be adjusted based on specific circumstances and are subject to change without prior notice. We do not guarantee a response to any particular issue or category of issues. The use of the information in this document or any related links is at your own risk.

Privacy Policy

If you have any questions, concerns, feedback, or complaints regarding our Privacy Policy, or if you believe that ASUS has not complied with it, please do not hesitate contact us through 📧 privacy@stzgcm.com.