CVE-2022-22262
📋 TL;DR
CVE-2022-22262 is a local privilege escalation vulnerability in ROG Live Service where improper symbolic link handling allows unauthenticated local attackers to delete arbitrary system files. This can disrupt system services and potentially cause denial of service. Affected systems include ASUS ROG devices running vulnerable versions of ROG Live Service.
💻 Affected Systems
- ASUS ROG Live Service
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical system files, leading to system crashes, data loss, or persistent denial of service requiring OS reinstallation.
Likely Case
Local attackers delete important system files causing service disruptions, application failures, or system instability requiring administrative intervention.
If Mitigated
Limited impact with proper access controls and monitoring, potentially causing temporary service disruption but no persistent damage.
🎯 Exploit Status
Exploitation requires local access but no authentication. Attack involves creating symbolic links to target system files before the service deletes its temp files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Updated version of ROG Live Service (specific version not specified in public advisories)
Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html
Restart Required: Yes
Instructions:
1. Update ROG Live Service through ASUS Armoury Crate or MyASUS applications. 2. Alternatively, download the latest version from ASUS support website. 3. Restart the system after installation.
🔧 Temporary Workarounds
Disable ROG Live Service
windowsTemporarily disable the vulnerable service until patching is possible
sc stop "ASUS ROG Live Service"
sc config "ASUS ROG Live Service" start= disabled
Restrict symbolic link creation
windowsConfigure Windows to restrict symbolic link creation to administrators only
secedit /export /cfg config.inf
Edit config.inf to set SeCreateSymbolicLinkPrivilege = *S-1-5-32-544
secedit /configure /db config.sdb /cfg config.inf
🧯 If You Can't Patch
- Remove or disable ROG Live Service from affected systems
- Implement strict access controls to prevent unauthorized local access to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check ROG Live Service version in Programs and Features or via ASUS Armoury Crate. Versions prior to the patched release are vulnerable.
Check Version:
wmic product where "name like 'ROG Live Service%'" get version
Verify Fix Applied:
Verify ROG Live Service is updated to latest version and test symbolic link creation in temp directories to ensure proper validation.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file deletion events in Windows Security logs
- ROG Live Service errors or crashes in Application logs
- Symbolic link creation in ROG Live Service temp directories
Network Indicators:
- No network indicators - this is a local attack
SIEM Query:
EventID=4663 AND ObjectName LIKE '%ROG Live Service%temp%' AND AccessMask=0x10000