CVE-2025-11901 (GCVE-0-2025-11901)
Vulnerability from cvelistv5
Published
2025-12-17 04:23
Modified
2025-12-17 21:46
CWE
  • CWE-284 - Improper Access Control
Summary
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-11901",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-17T21:46:16.833758Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-17T21:46:24.887Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "B460 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 1805, 2002, 3002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "B560 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 2402, 2803"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "B660 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 3810, 4501"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "B760 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 1825, 3102"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "H410 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 1805, 2002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "H470 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 3002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "H510 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 2402, 2803"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "H610 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 3810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "W480 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 1002, 2603, 3302"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "W680 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 2015, 2701, 4501"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Z590 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 2402, 2803"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Z690 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 3810, 4501"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Z790 series",
          "vendor": "ASUS",
          "versions": [
            {
              "status": "affected",
              "version": "before 1825, 2102, 3102"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Mohamed Al-Sharifi  \u0026 Nick Peterson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;Intel  B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003eExploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\u003cbr\u003eRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u00a0Intel  B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\nRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "PHYSICAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284: Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-17T04:23:51.784Z",
        "orgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
        "shortName": "ASUS"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.asus.com/security-advisory/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
    "assignerShortName": "ASUS",
    "cveId": "CVE-2025-11901",
    "datePublished": "2025-12-17T04:23:51.784Z",
    "dateReserved": "2025-10-17T06:47:40.071Z",
    "dateUpdated": "2025-12-17T21:46:24.887Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-11901\",\"sourceIdentifier\":\"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\",\"published\":\"2025-12-17T05:16:10.793\",\"lastModified\":\"2025-12-18T15:08:06.237\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u00a0Intel  B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\\nRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"references\":[{\"url\":\"https://www.asus.com/security-advisory/\",\"source\":\"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-11901\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-17T21:46:16.833758Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-17T21:46:20.739Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Mohamed Al-Sharifi  \u0026 Nick Peterson\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ASUS\", \"product\": \"B460 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 1805, 2002, 3002\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"B560 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 2402, 2803\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"B660 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 3810, 4501\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"B760 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 1825, 3102\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"H410 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 1805, 2002\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"H470 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 3002\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"H510 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 2402, 2803\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"H610 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 3810\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"W480 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 1002, 2603, 3302\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"W680 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 2015, 2701, 4501\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"Z590 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 2402, 2803\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"Z690 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 3810, 4501\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ASUS\", \"product\": \"Z790 series\", \"versions\": [{\"status\": \"affected\", \"version\": \"before 1825, 2102, 3102\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.asus.com/security-advisory/\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\\u00a0Intel  B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\\nRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;Intel  B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e. \u003c/span\u003eExploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\u003cbr\u003eRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284: Improper Access Control\"}]}], \"providerMetadata\": {\"orgId\": \"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\", \"shortName\": \"ASUS\", \"dateUpdated\": \"2025-12-17T04:23:51.784Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-11901\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-17T21:46:24.887Z\", \"dateReserved\": \"2025-10-17T06:47:40.071Z\", \"assignerOrgId\": \"54bf65a7-a193-42d2-b1ba-8e150d3c35e1\", \"datePublished\": \"2025-12-17T04:23:51.784Z\", \"assignerShortName\": \"ASUS\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…