Close Menu
geekfence.comgeekfence.com
    What's Hot

    HCLTech acquires HPE telco unit

    December 29, 2025

    This tiny chip could change the future of quantum computing

    December 29, 2025

    What’s In a Name? Mainframe GDGs Get the Job Done

    December 29, 2025
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374
    Cyber Security

    Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374

    AdminBy AdminDecember 22, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374

    An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or ongoing exploitation.

    The CVE documents a historic supply-chain attack in an End-of-Life (EoL) software product, not a newly emerging threat.

    Not all CISA KEVs signal urgency

    Recent coverage of CVE-2025-59374 has framed the issue as a newly relevant security risk following its addition to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

    Wiz

    A closer look, however, shows the reality is much more nuanced.

    The CVE documents the 2018-2019 “ShadowHammer” supply-chain attack, in which maliciously modified ASUS Live Update binaries were selectively delivered to a small number of targeted systems.

    The CVE entry for the compromise, now-rated a 9.3 (Critical) on the CVSS scale, states:

    “UNSUPPORTED WHEN ASSIGNED” Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.

    The ‘unsupported when assigned‘ text already suggests that the CVE was filed for an EoL product.

    The primary vendor advisory linked to in the CVE entry is from 2019. This advisory additionally links to an FAQ: bearing the last updated timestamp, 2025/12/06 20:09.

    Note, however, this FAQ 1018727 link existed in that spot back in 2019 when the advisory was first published.

    ASUS 2019 advisory on ShadowHammer attack
    ASUS 2019 advisory on ShadowHammer attack (BleepingComputer)

    As seen by BleepingComputer, the FAQ page does not provide the first publication timestamp metadata. Rather, it has simply been updated this month and shows the aforementioned December 6th date on the page.

    ASUS FAQ updated in December 2025
    ASUS FAQ updated in December 2025 doesn’t show original publication date

    (BleepingComputer)

    The archived pages help us establish the purpose of the page, and why recent updates made to the page do not necessarily mean a renewed risk from the 2019 issue.

    The FAQ entry appears to be ASUS’ placeholder page, periodically revised to provide information on the upgrade path, i.e. the latest version users should adopt for the vendor’s Live Update utility.

    Furthermore, the page continues to display (older) remediation guidance with screenshots bearing 2019 dates:

    ASUS screenshots bear 2019 dates
    ASUS screenshots in updated FAQ still bear 2019 dates (BleepingComputer)

    To get more information about the 2025 CVE assignment, BleepingComputer reached out to ASUS well in advance of publishing but we did not hear back.

    We additionally reached out to CISA to understand what prompted the CVE’s addition to the KEV catalog.

    CISA declined to provide additional comment, instead pointing BleepingComputer to language in Binding Operational Directive 22-01, which notes:

    “Addition of a vulnerability to the KEV catalog does not indicate that CISA is observing current active exploitation. If there is accurate reporting of active exploitation, any vulnerability, despite its age, can qualify for KEV catalog addition”

    Taken together, the evidence suggests the CVE assignment reflects a retrospective classification effort, formally documenting a well-known attack that predated CVE issuance.

    Practical guidance for users

    You should still ensure that you have the latest, patched version of the product.

    According to the CVE entry, the affected software, ASUS Live Update, reached End-of-Support (EOS) in October 2021, with “no currently supported devices or products are affected by this issue.”

    The updated ASUS FAQ page from this month, however, contradicts this wording, implying that the support definitively ended on December 4, 2025:

    “We announced end of support for ASUS LiveUpdate on 2025/12/4, the last version is 3.6.15.“

    ASUS FAQ updated in 2025 still mentions older advice
    ASUS FAQ updated in 2025 still mentions older upgrade advice beneath the updated instructions

    (BleepingComputer)

    Earlier copies (2019-22) of the FAQ recommended upgrading to “V3.6.8 or higher version to resolve security concerns,” as a fix for the issue was implemented in that version at the time. That dated advice has been left as-is on the updated FAQ from this month.

    The release 3.6.15, however, is now listed as the “last version.” That version apparently existed as early as March 2024 if not before, meaning there is no new urgency to upgrade—contrary to the usual call-to-action following recent supply chain compromises.

    CVE-2025-59374 formalizes a well-documented historical attack. FAQ updates, older remediation guidance, the utility’s latest release, and CISA context show the page was updated for documentation purposes, not to address a new exploit, impose patching requirements, or signal immediate risk.

    Security teams should therefore be mindful when treating CISA-linked CVEs as urgent, particularly for retired software or long-resolved incidents.


    tines

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

    December 28, 2025

    What are brushing scams and how do I stay safe?

    December 27, 2025

    Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone

    December 26, 2025

    Closing the gap: bitsIO wins Splunkie Award for data and AI-powered nonprofit solutions

    December 25, 2025

    Google Online Security Blog: Further Hardening Android GPUs

    December 23, 2025
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 20258 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20258 Views

    Here’s the latest company planning for gene-edited babies

    November 2, 20257 Views
    Don't Miss

    HCLTech acquires HPE telco unit

    December 29, 2025

    HCLTech moves toward a future of AI-driven growth In sum – what we know: The…

    This tiny chip could change the future of quantum computing

    December 29, 2025

    What’s In a Name? Mainframe GDGs Get the Job Done

    December 29, 2025

    Microsoft named a Leader in Gartner® Magic Quadrant™ for AI Application Development Platforms

    December 29, 2025
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    HCLTech acquires HPE telco unit

    December 29, 2025

    This tiny chip could change the future of quantum computing

    December 29, 2025

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2025 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.