- Asus updates the Myasus application to solve two new security problems affecting PCs
- The company confirms the problems spent in routers and software is now fully resolved
- Users have asked to update software, use solid passwords and deactivate unused services
Asus has published new security fixes for its Myasus software, following new security researchers reports highlighting the faults of several services.
The update applies to all compatible office computers, laptops, nuc and all-in-one PC, dealing with two vulnerabilities followed in the form of CVE-2025-4569 and CVE-2025-4570.
The new versions are 4.0.36.0 for systems X64 and 4.2.35.0 for ARM -based computers – and users can update via the Myasus application or via the Microsoft store.
Patch now
The CVE-2025-4569 defect received a CVSS V4.0 score of 7.7, marking it as a strong gravity. The CVE-2025-4570 was evaluated at 6.9, a medium level risk.
Both are resolved in the update. The ASUS also confirmed that it tackled related problems in armory, driverhub and specific router models, although the details were limited. The company claims that all the reported vulnerabilities have now been resolved.
This correction follows a series of vulnerability disclosure this year.
In April 2025, the company corrected critical vulnerability in routers using Aicloud, a service that allows users to access and share files on the Internet.
Followed in CVE-2025-2492, he had a gravity score of 9.2 and could allow remote attackers to perform functions without authorization.
ASUS urged users to deactivate Aicloud on models not supported and updated the firmware immediately.
Then, in June 2025, ASUS also corrected the CVE-2024-3080, a defect in critical authentication affecting seven models of popular routers, including Zenwifi XT8 and RT -Ax88u.
This update has also covered a buffer overflow problem and an execution bug of the system order, both linked to administration privileges.
In a related incident, a lack of high severity followed as CVE-2023-39780 was operated by the attackers to build a botnet using compromise routers.
This vulnerability has enabled persistent access via non -volatile memory.
Asus responded by urging users to reset assigned devices and to use stronger identification information.
It is important to keep your router safe – whatever the brand – by regularly checking the firmware, updating software and limiting remote access features whenever possible.