ASUS Fixes High-Severity MyASUS Vulnerability that Allows Privilege Escalation to SYSTEM-Level Access

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

ASUS has fixed a significant security vulnerability in its pre-installed MyASUS software that impacts several Windows-based personal computers. The flaw resides in the ASUS System Control Interface Service, a core component that manages hardware settings and system utilities. 

The vulnerability, identified as CVE-2025-59373, carries a high-severity CVSS 4.0 score of 8.5, enabling an attacker with local access to a machine to execute a privilege escalation attack and gain full administrative control.

Understanding the Privilege Escalation Flaw

This ASUS privilege escalation flaw is particularly serious because it allows a threat actor with even minimal local user rights to elevate their permissions to NT AUTHORITY\SYSTEM. 

With this level of access, an attacker can execute arbitrary code, install malware, exfiltrate sensitive data, and alter system configurations without restriction. 

While the exploit requires initial local access, its low complexity and the lack of required user interaction make it a significant threat, especially in corporate environments where a single compromised endpoint could facilitate lateral movement across the network.

ASUS Security Update and Mitigation

In response to the discovery, ASUS has issued a security advisory and released patched versions of the affected software. The company strongly recommends that all users update their systems to mitigate the risk associated with the ASUS MyASUS vulnerability. 

The fixed versions are the ASUS System Control Interface:

The advisory notes that is update applies to all personal computers, including desktops, laptops, NUCs, and All-in-One PCs.

This ASUS security update will be delivered automatically through Windows Update to eligible systems. Organizations with ASUS devices should prioritize the deployment of this patch and monitor their systems for any signs of exploitation.

A different security bulletin published on the same day addressed potential vulnerabilities in ASUS Router firmware 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: