CVE-2023-5716

9.8 CRITICAL

📋 TL;DR

CVE-2023-5716 is a critical vulnerability in ASUS Armoury Crate software that allows remote attackers to write arbitrary files to the system without authentication. This affects all users running vulnerable versions of ASUS Armoury Crate, primarily on Windows systems. Attackers can exploit this to modify system files, install malware, or gain unauthorized access.

💻 Affected Systems

Products:
  • ASUS Armoury Crate
Versions: Versions prior to the patched release (specific version numbers not provided in references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of vulnerable Armoury Crate versions. The software is commonly pre-installed on ASUS gaming systems and laptops.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to ransomware deployment, data theft, or persistent backdoor installation

🟠

Likely Case

Malware installation, system file corruption, or privilege escalation leading to unauthorized access

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent remote exploitation

🌐 Internet-Facing: HIGH - Remote attackers can exploit without authentication via HTTP requests
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability without credentials

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific HTTP requests to vulnerable endpoints. No authentication is needed, making this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version of Armoury Crate (check ASUS website for specific version)

Vendor Advisory: https://www.asus.com/support/FAQ/1051545/

Restart Required: Yes

Instructions:

1. Open Armoury Crate. 2. Check for updates in settings. 3. Install latest version. 4. Restart system. Alternatively, download from ASUS support site.

🔧 Temporary Workarounds

Disable Armoury Crate Service

windows

Temporarily disable the vulnerable service to prevent exploitation

sc stop ArmouryCrateService
sc config ArmouryCrateService start= disabled

Block Network Access

windows

Use firewall to block inbound connections to Armoury Crate

netsh advfirewall firewall add rule name="Block Armoury Crate" dir=in action=block program="C:\Program Files\ASUS\ArmouryCrate\ArmouryCrate.Service.exe" enable=yes

🧯 If You Can't Patch

  • Uninstall Armoury Crate completely if not required
  • Implement strict network segmentation to isolate affected systems from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check Armoury Crate version in Settings > About. If version is outdated or shows update available, system may be vulnerable.

Check Version:

wmic product where "name like 'Armoury Crate%'" get version

Verify Fix Applied:

Verify Armoury Crate is updated to latest version and no updates are pending. Check service is running with current version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Armoury Crate endpoints
  • File creation/modification in system directories by ArmouryCrate.Service.exe

Network Indicators:

  • HTTP POST/PUT requests to Armoury Crate service ports (typically 80/443 or custom ports)
  • Unusual outbound connections from Armoury Crate process

SIEM Query:

process_name:"ArmouryCrate.Service.exe" AND (event_type:file_create OR event_type:file_modify) AND file_path:("C:\\Windows\\*" OR "C:\\Program Files\\*")

🔗 References

📤 Share & Export