CVE-2024-33218
📋 TL;DR
This vulnerability in the ASUS USB 3.0 Boost Storage Driver allows attackers to escalate privileges and execute arbitrary code by sending crafted IOCTL requests to the AsUpIO64.sys driver. It affects systems with the vulnerable driver installed, primarily Windows systems using ASUS hardware with this specific driver version.
💻 Affected Systems
- ASUS USB 3.0 Boost Storage Driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, enabling complete control over the affected system, data theft, persistence mechanisms, and lateral movement within the network.
Likely Case
Local privilege escalation from a lower-privileged user account to SYSTEM/administrator level, allowing installation of malware, disabling security controls, or accessing protected resources.
If Mitigated
Limited impact if proper endpoint protection, driver signature enforcement, and least privilege principles are implemented, though the vulnerability still presents a significant local attack vector.
🎯 Exploit Status
Public proof-of-concept code exists in the DriverHunter repository. Exploitation requires initial access to execute code as a standard user, then uses IOCTL requests to trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
1. Check ASUS support website for driver updates. 2. If no patch available, consider removing the vulnerable driver if not essential. 3. Monitor ASUS security advisories for updates.
🔧 Temporary Workarounds
Disable or remove vulnerable driver
windowsUninstall the ASUS USB 3.0 Boost Storage Driver if not required for system functionality
sc stop AsUpIO64
sc delete AsUpIO64
Remove via Programs and Features in Control Panel
Restrict driver loading
windowsUse Windows Driver Signature Enforcement to prevent unsigned or vulnerable drivers from loading
bcdedit /set nointegritychecks off
bcdedit /set testsigning off
🧯 If You Can't Patch
- Implement strict application control policies to prevent execution of unauthorized binaries that could exploit this vulnerability
- Enforce least privilege principles to limit the impact if exploitation occurs, ensuring standard users have minimal permissions
🔍 How to Verify
Check if Vulnerable:
Check driver version in Device Manager under System devices or Storage controllers, or run: driverquery | findstr AsUpIO64
Check Version:
driverquery /v | findstr AsUpIO64
Verify Fix Applied:
Verify the driver is no longer present or has been updated to a non-vulnerable version using the same check methods
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing driver loading/unloading events for AsUpIO64.sys
- Process creation events showing privilege escalation patterns
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
EventID=7045 AND ServiceName="AsUpIO64" OR ProcessName="AsUpIO64.sys"