Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-12957

Disclosure Date: January 23, 2025 (last updated January 23, 2025)
A file handling command vulnerability in certain versions of Armoury Crate may result in arbitrary file deletion. Refer to the '01/23/2025 Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.
0
Attacker Value
Unknown

CVE-2023-5716

Disclosure Date: January 19, 2024 (last updated January 30, 2024)
ASUS Armoury Crate has a vulnerability in arbitrary file write and allows remote attackers to access or modify arbitrary files by sending specific HTTP requests without permission.
Attacker Value
Unknown

CVE-2023-26911

Disclosure Date: July 26, 2023 (last updated October 08, 2023)
ASUS SetupAsusServices v1.0.5.1 in Asus Armoury Crate v5.3.4.0 contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges.
Attacker Value
Unknown

CVE-2022-42455

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
ASUS EC Tool driver (aka d.sys) 1beb15c90dcf7a5234ed077833a0a3e900969b60be1d04fcebce0a9f8994bdbb, as signed by ASUS and shipped with multiple ASUS software products, contains multiple IOCTL handlers that provide raw read and write access to port I/O and MSRs via unprivileged IOCTL calls. Local users can gain privileges.
Attacker Value
Unknown

CVE-2022-38699

Disclosure Date: September 15, 2022 (last updated October 08, 2023)
Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.
Attacker Value
Unknown

CVE-2021-40981

Disclosure Date: September 27, 2021 (last updated November 28, 2024)
ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.