- ASUS UPDATE THE MYSUS application to solve two new security problems that affect PCs.
- The company confirms that the past problems in routers and software are now completely resolved
- Users urged to update the software, use safe passwords and disable unused services
Asus has published new security patches for its Mystas software, after new reports of security researchers who highlight multiple services.
The update applies to all desks, laptops, NUCS and PC all in one compatible, which address two tracked vulnerabilities such as CVE-2025-4569 and CVE-2025-4570.
The new versions are 4.0.36.0 for X64 and 4.2.35.0 systems for ARM -based computers, and users can update through the Mystas OA application through Microsoft Store.
Patch now
The CVE-2025-4569 defect received a CVSS V4.0 score, which marked it as high severity. CVE-2025-4570 was classified into 6.9, a medium level risk.
Both are resolved in the update. Asus also confirmed that the IS has addressed related problems in Armory Crate, Driverhub and specific router models, although the details were limited. The company says that all reported vulnerabilities have been resolved.
This patch follows a chain of vulnerability revelations this year.
In April 2025, the company repaired a critical vulnerability in the routers using AICLOUD, a service that allows users to access and share files through the Internet.
Monitoring as CVE-2025-2492, had a gravity score of 9.2 and could allow remote attackers to execute functions without permission.
Asus urged users to disable AICloud in non -compatible models and update the firmware immediately.
Then, in June 2025, Asus also repaired CVE-2024-3080, a critical failure of authentication that affects seven models of popular routors, including Zenwifi XT8 and RT-AX88U.
This update also covered a problem of buffer overflow and a system command execution error, both linked to administration privileges.
In a related incident, the attackers exploited a high severity failure such as CVE-2023-39780 to build a botnet using compromised routers.
This vulnerability allowed persistent access through non -volatile memory.
Asus responded by urging users to restore affected devices and use stronger credentials.
It is important to maintain its safe router, regardless of the brand, verifying the firmware regularly, updating the software and limiting remote access functions whenever possible.