Cyber Posture

CVE-2025-12793

HighLPE

Published: 06 January 2026

Published
06 January 2026
Modified
28 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12793 is a high-severity Untrusted Search Path (CWE-426) vulnerability in Asus Myasus. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Side-Loading (T1574.002); ranked at the 7.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to DLL Side-Loading (T1574.002). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly addressing this CVE by mandating application of the ASUS security update for MyASUS that fixes the uncontrolled DLL loading path in AsusSoftwareManagerAgent.

prevent

CM-6 enforces secure configuration settings, such as enabling Safe DLL Search Mode in Windows, which mitigates uncontrolled DLL loading by prioritizing system directories over attacker-controlled paths.

preventdetect

SI-7 provides software integrity verification to detect unauthorized or malicious DLLs loaded by AsusSoftwareManagerAgent, preventing execution of attacker-placed code from uncontrolled paths.

MITRE ATT&CK Enterprise TechniquesAI

T1574.002 DLL Side-Loading Stealth
Adversaries may execute their own malicious payloads by side-loading DLLs.
Why these techniques?

Uncontrolled DLL load path (CWE-426) directly enables attacker-supplied DLL to be loaded by the process, matching DLL Side-Loading.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker may influence the application to load a DLL from an attacker-controlled location, potentially resulting in arbitrary code execution. Refer to the ' Security Update for MyASUS' section on…

more

the ASUS Security Advisory for more information.

Deeper analysisAI

CVE-2025-12793 is an uncontrolled DLL loading path vulnerability (CWE-426) in AsusSoftwareManagerAgent, a component associated with ASUS software such as MyASUS. Published on 2026-01-06, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The flaw allows the application to load a dynamic link library from an unintended, attacker-specified path.

A local attacker can exploit this vulnerability by influencing AsusSoftwareManagerAgent to load a malicious DLL from a location under their control, potentially resulting in arbitrary code execution with the privileges of the affected process. Exploitation requires local access to the system, low complexity, no special privileges, and user interaction, such as convincing a user to trigger the vulnerable functionality.

The ASUS Security Advisory, available at https://www.asus.com/security-advisory, addresses mitigation in the "Security Update for MyASUS" section, recommending users apply the provided updates to resolve the uncontrolled DLL loading issue.

Details

CWE(s)

Affected Products

asus
myasus
≤ 4.0.52.0 · ≤ 4.2.50.0

CVEs Like This One

CVE-2025-15101Same vendor: Asus
CVE-2026-2998Shared CWE-426
CVE-2025-59367Same vendor: Asus
CVE-2025-59374Same vendor: Asus
CVE-2026-33156Shared CWE-426
CVE-2025-49457Shared CWE-426
CVE-2026-21333Shared CWE-426
CVE-2026-3780Shared CWE-426
CVE-2024-48123Shared CWE-426
CVE-2025-12819Shared CWE-426

References