Search criteria
2 vulnerabilities found for W680 series by ASUS
CVE-2025-11901 (GCVE-0-2025-11901)
Vulnerability from nvd – Published: 2025-12-17 04:23 – Updated: 2025-12-17 21:46
VLAI?
Summary
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).
Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
Severity ?
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ASUS | B460 series |
Affected:
before 1805, 2002, 3002
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Mohamed Al-Sharifi & Nick Peterson
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11901",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T21:46:16.833758Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T21:46:24.887Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "B460 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1805, 2002, 3002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B560 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B660 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1825, 3102"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H410 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1805, 2002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H470 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H510 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H610 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W480 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1002, 2603, 3302"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W680 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2015, 2701, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z590 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z690 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z790 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1825, 2102, 3102"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Mohamed Al-Sharifi \u0026 Nick Peterson"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003eExploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\u003cbr\u003eRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\n\n\u003cbr\u003e"
}
],
"value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u00a0Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\nRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "PHYSICAL",
"baseScore": 7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T04:23:51.784Z",
"orgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"shortName": "ASUS"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.asus.com/security-advisory/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"assignerShortName": "ASUS",
"cveId": "CVE-2025-11901",
"datePublished": "2025-12-17T04:23:51.784Z",
"dateReserved": "2025-10-17T06:47:40.071Z",
"dateUpdated": "2025-12-17T21:46:24.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-11901 (GCVE-0-2025-11901)
Vulnerability from cvelistv5 – Published: 2025-12-17 04:23 – Updated: 2025-12-17 21:46
VLAI?
Summary
An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).
Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information.
Severity ?
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ASUS | B460 series |
Affected:
before 1805, 2002, 3002
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Mohamed Al-Sharifi & Nick Peterson
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11901",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-17T21:46:16.833758Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T21:46:24.887Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "B460 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1805, 2002, 3002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B560 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B660 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1825, 3102"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H410 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1805, 2002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H470 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3002"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H510 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H610 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W480 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1002, 2603, 3302"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W680 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2015, 2701, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z590 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 2402, 2803"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z690 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 3810, 4501"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Z790 series",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "before 1825, 2102, 3102"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Mohamed Al-Sharifi \u0026 Nick Peterson"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. \u003c/span\u003eExploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\u003cbr\u003eRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information.\n\n\u003cbr\u003e"
}
],
"value": "An uncontrolled resource consumption vulnerability affects certain ASUS motherboards using\u00a0Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA).\nRefer to the \u0027Security Update for UEFI firmware\u0027 section on the ASUS Security Advisory for more information."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "PHYSICAL",
"baseScore": 7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T04:23:51.784Z",
"orgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"shortName": "ASUS"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.asus.com/security-advisory/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"assignerShortName": "ASUS",
"cveId": "CVE-2025-11901",
"datePublished": "2025-12-17T04:23:51.784Z",
"dateReserved": "2025-10-17T06:47:40.071Z",
"dateUpdated": "2025-12-17T21:46:24.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}