CVE-2025-3464

| EUVD-2025-18377 HIGH
2025-06-16 54bf65a7-a193-42d2-b1ba-8e150d3c35e1
8.4
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:59 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:59 euvd
EUVD-2025-18377
CVE Published
Jun 16, 2025 - 09:15 nvd
HIGH 8.4

DescriptionNVD

A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

AnalysisAI

Race condition vulnerability in ASUS Armoury Crate that exploits a Time-of-check Time-of-use (TOCTOU) flaw to bypass authentication mechanisms. An authenticated local attacker can exploit this vulnerability to escalate privileges and potentially achieve integrity and availability impacts on the affected system. While the CVSS score of 8.4 is elevated, real-world exploitation requires local access and existing user privileges, limiting widespread impact.

Technical ContextAI

The vulnerability exists in ASUS Armoury Crate (CWE-367: Improper Synchronization), a system utility application commonly found on ASUS gaming and consumer systems. The root cause is a classic Time-of-check Time-of-use (TOCTOU) race condition where authentication or authorization checks are performed at one point in time, but the resource being protected is accessed at a later point. An attacker can manipulate system state between the check and use phases to bypass intended security controls. The CVSS:4.0 vector indicates this is a local attack (AV:L) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The high impact on integrity (VI:H) and availability (VA:H) demonstrates that successful exploitation can lead to system compromise beyond authentication bypass.

RemediationAI

  1. Immediate: Update ASUS Armoury Crate to the patched version specified in the ASUS Security Advisory (Security Update for Armoury Crate App section). 2) Until patching: Restrict use of Armoury Crate to trusted administrator accounts only; disable Armoury Crate if not required for system functionality. 3) Access control: Enforce least-privilege user account policies to limit the impact of TOCTOU exploitation—ensure standard users cannot access sensitive system functions through Armoury Crate. 4) Monitoring: Monitor for unexpected privilege escalation events or unauthorized changes to system settings, particularly on systems with Armoury Crate enabled. Users must obtain the exact patched version number from the ASUS support page referenced in the CVE advisory.

Share

CVE-2025-3464 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy