Логотип exploitDog
bind:CVE-2025-59373
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59373

Количество 3

Количество 3

nvd логотип

CVE-2025-59373

3 месяца назад

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyAsus in the ASUS Security Advisory.

EPSS: Низкий
github логотип

GHSA-h2gm-8gg9-5mh6

3 месяца назад

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyAsus in the ASUS Security Advisory.

EPSS: Низкий
fstec логотип

BDU:2025-14692

3 месяца назад

Уязвимость компонента AsusSwitchAgent драйвера ASUS System Control Interface (ASCI), позволяющая нарушителю выполнить произвольный код с правами system

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-59373

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyAsus in the ASUS Security Advisory.

0%
Низкий
3 месяца назад
github логотип
GHSA-h2gm-8gg9-5mh6

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyAsus in the ASUS Security Advisory.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14692

Уязвимость компонента AsusSwitchAgent драйвера ASUS System Control Interface (ASCI), позволяющая нарушителю выполнить произвольный код с правами system

CVSS3: 7.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу