CVSS VectorNVD
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H
Lifecycle Timeline
3DescriptionNVD
A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.
AnalysisAI
Race condition vulnerability in ASUS Armoury Crate that exploits a Time-of-check Time-of-use (TOCTOU) flaw to bypass authentication mechanisms. An authenticated local attacker can exploit this vulnerability to escalate privileges and potentially achieve integrity and availability impacts on the affected system. While the CVSS score of 8.4 is elevated, real-world exploitation requires local access and existing user privileges, limiting widespread impact.
Technical ContextAI
The vulnerability exists in ASUS Armoury Crate (CWE-367: Improper Synchronization), a system utility application commonly found on ASUS gaming and consumer systems. The root cause is a classic Time-of-check Time-of-use (TOCTOU) race condition where authentication or authorization checks are performed at one point in time, but the resource being protected is accessed at a later point. An attacker can manipulate system state between the check and use phases to bypass intended security controls. The CVSS:4.0 vector indicates this is a local attack (AV:L) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The high impact on integrity (VI:H) and availability (VA:H) demonstrates that successful exploitation can lead to system compromise beyond authentication bypass.
RemediationAI
- Immediate: Update ASUS Armoury Crate to the patched version specified in the ASUS Security Advisory (Security Update for Armoury Crate App section). 2) Until patching: Restrict use of Armoury Crate to trusted administrator accounts only; disable Armoury Crate if not required for system functionality. 3) Access control: Enforce least-privilege user account policies to limit the impact of TOCTOU exploitation—ensure standard users cannot access sensitive system functions through Armoury Crate. 4) Monitoring: Monitor for unexpected privilege escalation events or unauthorized changes to system settings, particularly on systems with Armoury Crate enabled. Users must obtain the exact patched version number from the ASUS support page referenced in the CVE advisory.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18377