Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-3508

Summary
Assigner-ASUS
Assigner Org ID-54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Published At-08 May, 2026 | 02:00
Updated At-08 May, 2026 | 02:00
Rejected At-
Credits

An Out-of-bounds Read vulnerability in the IOCTL handler in ASUS System Control Interface allows a local user to cause system crash (BSOD) via a read size that exceeds the buffer size.Refer to the ' Security Update for MyASUS ' section on the ASUS Security Advisory for more information.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ASUS
Assigner Org ID:54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Published At:08 May, 2026 | 02:00
Updated At:08 May, 2026 | 02:00
Rejected At:
▼CVE Numbering Authority (CNA)

An Out-of-bounds Read vulnerability in the IOCTL handler in ASUS System Control Interface allows a local user to cause system crash (BSOD) via a read size that exceeds the buffer size.Refer to the ' Security Update for MyASUS ' section on the ASUS Security Advisory for more information.

Affected Products
Vendor
ASUS (ASUSTeK Computer Inc.)ASUS
Product
ASUS System Control Interface
Default Status
unaffected
Versions
Affected
  • From 0 through V3.1.59.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Type: CWE
CWE ID: CWE-125
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
4.06.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.asus.com/security-advisory
N/A
Hyperlink: https://www.asus.com/security-advisory
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Published At:08 May, 2026 | 03:16
Updated At:08 May, 2026 | 03:16

An Out-of-bounds Read vulnerability in the IOCTL handler in ASUS System Control Interface allows a local user to cause system crash (BSOD) via a read size that exceeds the buffer size.Refer to the ' Security Update for MyASUS ' section on the ASUS Security Advisory for more information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-125Secondary54bf65a7-a193-42d2-b1ba-8e150d3c35e1
CWE ID: CWE-125
Type: Secondary
Source: 54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.asus.com/security-advisory54bf65a7-a193-42d2-b1ba-8e150d3c35e1
N/A
Hyperlink: https://www.asus.com/security-advisory
Source: 54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

6Records found

CVE-2025-9337
Matching Score-8
Assigner-ASUSTeK Computer Incorporation
ShareView Details
Matching Score-8
Assigner-ASUSTeK Computer Incorporation
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.67%
||
7 Day CHG~0.00%
Published-13 Oct, 2025 | 09:24
Updated-21 Oct, 2025 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A null pointer dereference has been identified in the AsIO3.sys driver. The vulnerability can be triggered by a specially crafted input, which may lead to a system crash (BSOD). Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-Armoury Crate
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-9336
Matching Score-8
Assigner-ASUSTeK Computer Incorporation
ShareView Details
Matching Score-8
Assigner-ASUSTeK Computer Incorporation
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 6.02%
||
7 Day CHG~0.00%
Published-13 Oct, 2025 | 09:24
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack buffer overflow has been identified in the AsIO3.sys driver. This vulnerability can be triggered by input manipulation, may leading to a system crash (BSOD) or other potentially undefined execution. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-Armoury Crate
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-11775
Matching Score-6
Assigner-ASUSTeK Computer Incorporation
ShareView Details
Matching Score-6
Assigner-ASUSTeK Computer Incorporation
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 7.36%
||
7 Day CHG~0.00%
Published-17 Dec, 2025 | 04:25
Updated-18 Dec, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds read vulnerability has been identified in the asComSvc service. This vulnerability can be triggered by sending specially crafted requests, which may lead to a service crash or partial loss of functionality. This vulnerability only affects ASUS motherboard series products. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-Armoury Crate
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-34358
Matching Score-6
Assigner-TWCERT/CC
ShareView Details
Matching Score-6
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.34% / 56.33%
||
7 Day CHG~0.00%
Published-31 Jul, 2023 | 04:09
Updated-21 Oct, 2024 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASUS RT-AX88U - Out-of-bounds Read - 1

ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to a device which contains a specific user agent, causing the httpd binary to crash during a string comparison performed within web.c, resulting in a DoS condition.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-rt-ax88u_firmwarert-ax88uRT-AX88Urt-ax88u
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-15038
Matching Score-6
Assigner-ASUSTeK Computer Incorporation
ShareView Details
Matching Score-6
Assigner-ASUSTeK Computer Incorporation
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 4.95%
||
7 Day CHG~0.00%
Published-12 Mar, 2026 | 02:03
Updated-12 Mar, 2026 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-Bounds Read vulnerability exists in the ASUS Business System Control Interface driver. This vulnerability can be triggered by an unprivileged local user sending a specially crafted IOCTL  request, potentially leading to a disclosure of kernel information or a system crash. Refer to the "Security Update for ASUS  Business System Control Interface" section on the ASUS Security Advisory for more information.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-ASUS Business System Control Interface
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-34359
Matching Score-6
Assigner-TWCERT/CC
ShareView Details
Matching Score-6
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.33% / 56.01%
||
7 Day CHG~0.00%
Published-31 Jul, 2023 | 04:31
Updated-21 Oct, 2024 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASUS RT-AX88U - Out-of-bounds Read - 2

ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to the device which causes the httpd binary to crash within the "do_json_decode()" function of ej.c, resulting in a DoS condition.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-rt-ax88u_firmwarert-ax88uRT-AX88Urt-ax88u
CWE ID-CWE-125
Out-of-bounds Read
Details not found