CVE-2022-22262

7.7 HIGH

📋 TL;DR

CVE-2022-22262 is a local privilege escalation vulnerability in ROG Live Service where improper symbolic link handling allows unauthenticated local attackers to delete arbitrary system files. This can disrupt system services and potentially cause denial of service. Affected systems include ASUS ROG devices running vulnerable versions of ROG Live Service.

💻 Affected Systems

Products:
  • ASUS ROG Live Service
Versions: Versions prior to the patched release (specific version numbers not publicly documented)
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Affects ASUS ROG gaming devices and systems with ROG Live Service installed. The service typically runs with SYSTEM privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to system crashes, data loss, or persistent denial of service requiring OS reinstallation.

🟠

Likely Case

Local attackers delete important system files causing service disruptions, application failures, or system instability requiring administrative intervention.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially causing temporary service disruption but no persistent damage.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote shell access to the vulnerable system.
🏢 Internal Only: HIGH - Any local user or compromised account on affected systems can exploit this vulnerability to disrupt services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires local access but no authentication. Attack involves creating symbolic links to target system files before the service deletes its temp files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated version of ROG Live Service (specific version not specified in public advisories)

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html

Restart Required: Yes

Instructions:

1. Update ROG Live Service through ASUS Armoury Crate or MyASUS applications. 2. Alternatively, download the latest version from ASUS support website. 3. Restart the system after installation.

🔧 Temporary Workarounds

Disable ROG Live Service

windows

Temporarily disable the vulnerable service until patching is possible

sc stop "ASUS ROG Live Service"
sc config "ASUS ROG Live Service" start= disabled

Restrict symbolic link creation

windows

Configure Windows to restrict symbolic link creation to administrators only

secedit /export /cfg config.inf
Edit config.inf to set SeCreateSymbolicLinkPrivilege = *S-1-5-32-544
secedit /configure /db config.sdb /cfg config.inf

🧯 If You Can't Patch

  • Remove or disable ROG Live Service from affected systems
  • Implement strict access controls to prevent unauthorized local access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check ROG Live Service version in Programs and Features or via ASUS Armoury Crate. Versions prior to the patched release are vulnerable.

Check Version:

wmic product where "name like 'ROG Live Service%'" get version

Verify Fix Applied:

Verify ROG Live Service is updated to latest version and test symbolic link creation in temp directories to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in Windows Security logs
  • ROG Live Service errors or crashes in Application logs
  • Symbolic link creation in ROG Live Service temp directories

Network Indicators:

  • No network indicators - this is a local attack

SIEM Query:

EventID=4663 AND ObjectName LIKE '%ROG Live Service%temp%' AND AccessMask=0x10000

🔗 References

📤 Share & Export