CVE-2024-33218

7.8 HIGH

📋 TL;DR

This vulnerability in the ASUS USB 3.0 Boost Storage Driver allows attackers to escalate privileges and execute arbitrary code by sending crafted IOCTL requests to the AsUpIO64.sys driver. It affects systems with the vulnerable driver installed, primarily Windows systems using ASUS hardware with this specific driver version.

💻 Affected Systems

Products:
  • ASUS USB 3.0 Boost Storage Driver
Versions: Version 5.30.20.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where this specific ASUS driver version is installed, typically on ASUS hardware. The driver may be bundled with ASUS motherboard utilities or system software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling complete control over the affected system, data theft, persistence mechanisms, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a lower-privileged user account to SYSTEM/administrator level, allowing installation of malware, disabling security controls, or accessing protected resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, driver signature enforcement, and least privilege principles are implemented, though the vulnerability still presents a significant local attack vector.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access or code execution first, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, malware, etc.), this vulnerability provides an easy path to full system compromise within the internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public proof-of-concept code exists in the DriverHunter repository. Exploitation requires initial access to execute code as a standard user, then uses IOCTL requests to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check ASUS support website for driver updates. 2. If no patch available, consider removing the vulnerable driver if not essential. 3. Monitor ASUS security advisories for updates.

🔧 Temporary Workarounds

Disable or remove vulnerable driver

windows

Uninstall the ASUS USB 3.0 Boost Storage Driver if not required for system functionality

sc stop AsUpIO64
sc delete AsUpIO64
Remove via Programs and Features in Control Panel

Restrict driver loading

windows

Use Windows Driver Signature Enforcement to prevent unsigned or vulnerable drivers from loading

bcdedit /set nointegritychecks off
bcdedit /set testsigning off

🧯 If You Can't Patch

  • Implement strict application control policies to prevent execution of unauthorized binaries that could exploit this vulnerability
  • Enforce least privilege principles to limit the impact if exploitation occurs, ensuring standard users have minimal permissions

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under System devices or Storage controllers, or run: driverquery | findstr AsUpIO64

Check Version:

driverquery /v | findstr AsUpIO64

Verify Fix Applied:

Verify the driver is no longer present or has been updated to a non-vulnerable version using the same check methods

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing driver loading/unloading events for AsUpIO64.sys
  • Process creation events showing privilege escalation patterns

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=7045 AND ServiceName="AsUpIO64" OR ProcessName="AsUpIO64.sys"

🔗 References

📤 Share & Export