CVE-2025-11901

N/A Unknown

📋 TL;DR

An uncontrolled resource consumption vulnerability in certain ASUS motherboards with Intel chipsets allows physical attackers to install malicious devices in expansion slots, potentially leading to unauthorized direct memory access (DMA). This affects ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, and W680 chipsets.

💻 Affected Systems

Products:
  • ASUS motherboards with Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 chipsets
Versions: Specific firmware versions not specified in advisory; check ASUS Security Advisory for affected versions.
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires physical access to install malicious device in expansion slot and supporting software utility.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized DMA access leading to complete system compromise, data theft, or persistent malware installation via physical access to internal hardware.

🟠

Likely Case

System instability, denial of service through resource exhaustion, or limited data exposure if DMA protections are partially effective.

🟢

If Mitigated

Minimal impact with proper physical security controls and UEFI firmware updates applied.

🌐 Internet-Facing: LOW - Requires physical access to internal hardware components.
🏢 Internal Only: MEDIUM - Physical access to internal expansion slots is required, making internal threats more relevant than external ones.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical hardware access and specialized device/software, making it more complex than pure software attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific version not provided; refer to ASUS Security Advisory for 'Security Update for UEFI firmware'.

Vendor Advisory: https://www.asus.com/security-advisory/

Restart Required: Yes

Instructions:

1. Visit ASUS Security Advisory. 2. Identify your motherboard model. 3. Download latest UEFI firmware update. 4. Follow ASUS firmware update instructions. 5. Reboot system after update.

🔧 Temporary Workarounds

Physical Security Controls

all

Restrict physical access to computer hardware and expansion slots.

Disable Unused Expansion Slots

all

Disable unused PCIe/expansion slots in UEFI/BIOS settings if supported.

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized hardware access.
  • Monitor for unauthorized hardware changes and system resource consumption anomalies.

🔍 How to Verify

Check if Vulnerable:

Check motherboard model and chipset against ASUS Security Advisory; verify UEFI firmware version.

Check Version:

System-specific: Check UEFI/BIOS version during boot or use manufacturer utilities like ASUS AI Suite.

Verify Fix Applied:

Confirm UEFI firmware has been updated to version specified in ASUS Security Advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected hardware installation events
  • System resource exhaustion alerts
  • UEFI/BIOS modification logs

Network Indicators:

  • Not applicable - physical access required

SIEM Query:

EventID for hardware changes OR system resource alerts above threshold

🔗 References

📤 Share & Export