Flaw in Asus DriverHub makes utility vulnerable to remote code execution

hacker
(Image credit: Shutterstock)

A major security flaw has been discovered in Asus' DriverHub management utility that allows anyone to easily run malicious code on a system with the utility installed. Programmer "MrBruh" initially discovered the exploit, revealing DriverHub can be spoofed to run any sort of malicious content without user notice.

The flaw surrounds poorly executed security measures by the developers; the app connects to an API request on a predefined port, and will accept any URL that merely includes the handle "driverhub.asus.com". (A URL such as driverhub.asus.com.mrbruh.com will work.)

Aaron Klotz
Contributing Writer

Aaron Klotz is a contributing writer for Tom’s Hardware, covering news related to computer hardware such as CPUs, and graphics cards.

  • ejolson
    I'm wondering, are these automatic download and update schemes supposed to be convenience features or are they supposed to increase security?
    Reply
  • das_stig
    It's true if one gets a vulnerability then it's a danger, but not using one in my opinion is worse.
    Worked for many companies that never updated bios or drivers on computer images except during hardware refreshes or switching Windows images.
    I use mainly Dell and they all have DCU install and the number of updates is reassuring.
    I would actually prefer to have the manufacturers submit their drivers for Windows Update to handle and Microsoft do a second level validation.
    Yyes it is true I'd prefer not to have buggy software in the first place, but that's just wishful thinking.
    Reply