CVE-2019-10709
📋 TL;DR
This vulnerability in Asus Precision TouchPad driver allows attackers to cause a pool overflow via crafted DeviceIoControl calls to the \\.\AsusTP device. This can lead to denial of service (system crash) or potentially privilege escalation to kernel-level access. Affects users of Asus laptops with Precision TouchPad hardware running vulnerable driver versions.
💻 Affected Systems
- Asus Precision TouchPad
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with kernel-level privilege escalation allowing complete control of the system.
Likely Case
System crash/denial of service requiring physical reboot of the affected device.
If Mitigated
Limited to denial of service if proper kernel protections are enabled.
🎯 Exploit Status
Exploit requires local access or ability to execute code on the system. DeviceIoControl calls can be made from user mode.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later than 11.0.0.25 (check Asus support for specific version)
Vendor Advisory: https://www.asus.com/support/
Restart Required: Yes
Instructions:
1. Visit Asus support website. 2. Download latest Precision TouchPad driver. 3. Uninstall current driver. 4. Install updated driver. 5. Reboot system.
🔧 Temporary Workarounds
Disable Asus Precision TouchPad
windowsDisable the vulnerable driver through Device Manager
devmgmt.msc
Find 'Mice and other pointing devices'
Right-click Asus Precision TouchPad
Select 'Disable device'
Remove vulnerable driver
windowsUninstall the AsusPTPFilter driver completely
pnputil /enum-drivers
pnputil /delete-driver oem#.inf /uninstall
Replace # with driver number from enum
🧯 If You Can't Patch
- Restrict local user access to prevent unauthorized DeviceIoControl calls
- Enable kernel protections like Driver Signature Enforcement and Control Flow Guard
🔍 How to Verify
Check if Vulnerable:
Check driver version in Device Manager under Mice and other pointing devices > Asus Precision TouchPad > Driver tab
Check Version:
driverquery /v | findstr /i "AsusPTPFilter"
Verify Fix Applied:
Verify driver version is greater than 11.0.0.25 and test system stability
📡 Detection & Monitoring
Log Indicators:
- Multiple DeviceIoControl calls to \\.\AsusTP device
- System crashes or unexpected reboots
- Driver failure events in Event Viewer
Network Indicators:
- Not network exploitable - local vulnerability only
SIEM Query:
EventID=1000 OR EventID=41 AND Source="Kernel-Power" OR ProcessName contains "exploit" AND TargetObject contains "AsusTP"
🔗 References
- http://packetstormsecurity.com/files/154259/Asus-Precision-TouchPad-11.0.0.25-Denial-Of-Service-Privilege-Escalation.html
- https://blog.telspace.co.za/2019/08/tsa-2019-001-asus-precision-touchpad.html
- http://packetstormsecurity.com/files/154259/Asus-Precision-TouchPad-11.0.0.25-Denial-Of-Service-Privilege-Escalation.html
- https://blog.telspace.co.za/2019/08/tsa-2019-001-asus-precision-touchpad.html