Not Every CISA-Related Alert is Critical: ASUS Live Update CVE-2025-59374

Shape1 Shape2
Not Every CISA-Related Alert is Critical: ASUS Live Update CVE-2025-59374

CISA

Recently, an ASUS Live Update vulnerability identified as CVE-2025-59374 has gained attention in cybersecurity discussions, with some reports suggesting active exploitation.

This CVE references an older supply-chain attack involving an End-of-Life (EoL) software product, rather than presenting a new threat.

Not all CISA KEVs indicate urgency

Media coverage surrounding CVE-2025-59374 has characterized it as a pressing security concern after its addition to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Wiz

However, a closer examination reveals a more intricate reality.

The CVE outlines the 2018-2019 “ShadowHammer” supply-chain attack, which involved maliciously altered ASUS Live Update binaries that were distributed to select targeted systems.

The CVE entry regarding the compromise, currently rated a 9.3 (Critical) on the CVSS scale, states:

“UNSUPPORTED WHEN ASSIGNED” Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.

The phrase ‘unsupported when assigned‘ implies that this CVE was filed for an EoL product.

The main vendor advisory linked to the CVE entry dates back to 2019, and includes an FAQ: https://www.asus.com/support/faq/1018727/ that was last updated on 2025/12/06 20:09.

Importantly, this FAQ link was already present in 2019 when the original advisory was published.

ASUS 2019 advisory on ShadowHammer attack
ASUS 2019 advisory on ShadowHammer attack (BleepingComputer)

According to BleepingComputer, the FAQ page lacks the initial publication date metadata. It was simply revised this month, showing the mentioned December 6th date.

ASUS FAQ updated in December 2025
ASUS FAQ updated in December 2025 doesn’t show original publication date

(BleepingComputer)

The archived versions help clarify the page’s purpose and why the recent updates do not necessarily signal a renewed risk from the 2019 incident.

The FAQ appears to serve as ASUS’ placeholder page, periodically updated to inform users about the latest version of the Live Update utility they should use.

Additionally, the webpage continues to show older remediation guidance with screenshots dated 2019:

ASUS screenshots bear 2019 dates
ASUS screenshots in updated FAQ still bear 2019 dates (BleepingComputer)

For more clarity on the 2025 CVE classification, BleepingComputer reached out to ASUS before publication but did not receive a response.

We also contacted CISA to inquire about the decision to add the CVE to the KEV catalog.

CISA declined to provide more information, directing BleepingComputer to wording in the Binding Operational Directive 22-01, which states:

“The addition of a vulnerability to the KEV catalog does not imply that CISA is observing current active exploitation. If there is accurate reporting of active exploitation, any vulnerability, regardless of its age, can qualify for KEV catalog addition.”

This evidence suggests the CVE designation represents a retrospective classification, formally recognizing an already well-known attack that predated the CVE’s issuance.

Practical guidance for users

Users should ensure they have the latest patched version of the product.

The CVE entry indicates that the ASUS Live Update software reached End-of-Support (EOS) in October 2021, and no currently supported products are affected by this issue.

The updated ASUS FAQ page, however, contradicts this statement, suggesting that support definitively ended on December 4, 2025:

“We announced end of support for ASUS LiveUpdate on 2025/12/4, the last version is 3.6.15.

ASUS FAQ updated in 2025 still mentions older advice
ASUS FAQ updated in 2025 still mentions older upgrade advice beneath the updated instructions

(BleepingComputer)

Previous versions of the FAQ recommended upgrading to “V3.6.8 or higher version to resolve security concerns,” as a fix was implemented in that version back then. That outdated guidance remains unchanged on the updated FAQ from this month.

Although release 3.6.15 is now classified as the “last version,” it seemingly existed as early as March 2024, suggesting there is no immediate urgency for an upgrade—contrary to typical reactions following recent supply chain incidents.

The CVE-2025-59374 serves to formalize a historically documented attack. Updates on the FAQ, earlier remediation advice, the latest utility release, and CISA’s contextual information indicate that the page revisions were made for documentation purposes, rather than responding to a new exploit, enforcing patching mandates, or signaling immediate risk.

Therefore, security teams should exercise caution when interpreting CISA-associated CVEs as urgent, especially in relation to discontinued software or previously settled issues.

Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

This practical guide explores why traditional IAM practices fall short in modern settings, provides examples of effective IAM practices, and includes a straightforward checklist for creating a scalable strategy.

Leave a Reply

Your email address will not be published. Required fields are marked *