CISA Warns of Asus Live Update Supply Chain Backdoor Under Active Attack
CVE-2025-59374 exploits compromised ASUS software distribution to deploy backdoors on consumer and enterprise systems worldwide.
The U.S. Cybersecurity and Infrastructure Security Agency has added CVE-2025-59374 to its Known Exploited Vulnerabilities catalog, confirming active exploitation of a supply chain compromise affecting ASUS Live Update software. The attack distributed backdoored software updates to systems worldwide before detection.
TL;DR
- What happened: Attackers compromised ASUS Live Update distribution to push malicious software modifications to user systems
- Who's affected: Users of certain ASUS Live Update versions who received compromised updates
- Severity: Critical (CVSS 9.3) - Supply chain compromise with code execution capability
- Action required: Check ASUS security advisories for affected versions and apply remediation steps immediately
What is CVE-2025-59374?
CVE-2025-59374 describes a supply chain attack where certain versions of ASUS Live Update were distributed with unauthorized modifications introduced during the software distribution process. These modifications enable attackers to trigger unintended actions on targeted devices, effectively installing a backdoor through what appears to be a legitimate software update.
ASUS Live Update is a utility bundled with ASUS computers that automatically downloads and installs firmware, drivers, and software updates. Its privileged system access and automatic operation make it an attractive target for supply chain attacks.
How Supply Chain Attacks Work
Supply chain compromises represent one of the most insidious attack vectors because they exploit the trust relationship between users and software vendors. Rather than attacking end users directly, threat actors compromise the software development or distribution pipeline, turning legitimate update mechanisms into malware delivery systems.
In this case, attackers inserted malicious code into the ASUS Live Update distribution chain. When users installed what they believed were routine updates, they unknowingly deployed attacker-controlled code with system-level privileges.
This attack methodology bypasses many traditional security controls:
- Endpoint protection: Updates from trusted vendors are often whitelisted
- User vigilance: Users have no way to distinguish compromised updates from legitimate ones
- Network monitoring: Traffic to vendor update servers appears legitimate
Active Exploitation Confirmed
CISA's addition of CVE-2025-59374 to the Known Exploited Vulnerabilities catalog confirms that attackers have successfully weaponized this vulnerability against real-world targets. While specific details about the exploitation campaign remain limited, the KEV listing indicates the threat has moved beyond theoretical to active compromise.
Organizations using ASUS hardware should assume potential exposure and conduct thorough investigations, even if no obvious indicators of compromise are present.
Why This Matters
Supply chain attacks have emerged as a preferred technique for sophisticated threat actors because they provide access to large numbers of targets through a single point of compromise. The SolarWinds attack of 2020 demonstrated how supply chain compromises can affect thousands of organizations simultaneously.
The ASUS Live Update compromise follows this pattern, leveraging trusted software distribution to bypass security controls that would normally prevent malware installation. For enterprises managing fleets of ASUS hardware, the potential scope of exposure could be significant.
Recommended Mitigations
Organizations and individuals using ASUS systems should take immediate action.
- Review ASUS security advisories to determine if your Live Update version is affected
- Disable automatic updates temporarily while investigating potential compromise
- Conduct endpoint forensics on systems that may have received compromised updates
- Monitor for anomalous behavior including unexpected network connections or process execution
- Consider reimaging affected systems if compromise cannot be ruled out
- Update to patched versions once ASUS releases verified clean software
Enterprise Considerations
Organizations with significant ASUS hardware deployments face additional challenges:
- Asset inventory: Identify all systems running ASUS Live Update across the environment
- Version tracking: Determine which systems received updates during the compromise window
- Network segmentation: Isolate potentially affected systems during investigation
- Credential rotation: If compromise is confirmed, assume credential theft and rotate accordingly
The Broader Supply Chain Security Challenge
This incident reinforces the growing recognition that supply chain security requires dedicated attention from both vendors and customers. Organizations cannot simply trust that software from reputable vendors is safe—they must implement controls to detect and respond to supply chain compromises.
Emerging best practices include:
- Software Bill of Materials (SBOM): Understanding the components in deployed software
- Update verification: Implementing additional validation of software updates beyond vendor signing
- Behavioral monitoring: Detecting anomalous behavior from trusted software
- Vendor security assessment: Evaluating the security practices of software suppliers
Frequently Asked Questions
How do I know if my system received a compromised update? Check ASUS security advisories for the specific version numbers affected and compare against your installed ASUS Live Update version. ASUS may provide detection tools or indicators of compromise.
What should I do if I'm affected? Follow ASUS remediation guidance, which may include updating to a clean software version or removing the affected component entirely. Consider forensic investigation if the system handles sensitive data.
Is this similar to the 2019 ASUS supply chain attack? This appears to be a separate incident, though it exploits the same general attack vector—compromising software distribution to deploy malicious code. The 2019 "Operation ShadowHammer" attack similarly targeted ASUS Live Update.
CISA's Known Exploited Vulnerabilities catalog and ASUS security advisories provide authoritative guidance for affected organizations.
Related Articles
CISA Adds Two Roundcube Flaws to KEV After Active Exploitation
CISA adds CVE-2025-49113 (CVSS 9.9) and CVE-2025-68461 to KEV catalog after attackers weaponized the deserialization flaw within 48 hours. Federal agencies must patch by March 13.
Feb 21, 2026CISA Orders Feds to Patch Dell Flaw Within 3 Days
Federal agencies must patch CVE-2026-22769 by Saturday after CISA confirms Chinese hackers exploited the Dell RecoverPoint vulnerability since 2024.
Feb 19, 2026CISA Adds Four Flaws to KEV, Including 17-Year-Old ActiveX Bug
CISA confirms active exploitation of Chrome CVE-2026-2441, Zimbra SSRF, Windows ActiveX CVE-2008-0015, and ThreatSonar flaws. Federal agencies face March 10 deadline.
Feb 18, 202659 KEV Entries Quietly Flagged for Ransomware Use in 2025
GreyNoise reveals CISA silently updated ransomware indicators on 59 vulnerabilities without alerts. New RSS feed tool catches changes within an hour.
Feb 4, 2026