A key tool of Asus Windows has a worrying security defect: here we show you how to stay safe




  • Asus launched a patch for CVE-2025-3464, a high severity authentication derivation failure
  • The problem affects Armory Crate, a centralized center to manage ASUS and ROG hardware
  • The fault could lead to the complete acquisition of the device

Asus says that it has solved a vulnerability of high severity that could have allowed threat actors to avoid authentication requirements and obtain system privileges on a Windows device.

Recently, a Cisco Talos Security researcher discovered that a Arsenal Cash Core Core mode does not depend on the level of the appropriate operating system level, but that requests authenticly using a HASH SHA-256 coded scarf of scarertservices.exe and an PID permit.

Leave a Comment

Your email address will not be published. Required fields are marked *