CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call can lead to an out-of-bounds write. An attacker can issue an API call to trigger this vulnerability.
Analysis
CVE-2025-25050 is an out-of-bounds write vulnerability in Dell ControlVault3 and ControlVault 3 Plus that allows a local, authenticated attacker to trigger memory corruption through a specially crafted API call to the cv_upgrade_sensor_firmware function. An attacker with local access and low privileges can achieve high-impact compromise including complete confidentiality, integrity, and availability violations. The vulnerability affects all versions prior to ControlVault3 5.15.10.14 and ControlVault 3 Plus 6.2.26.36; exploitation requires local access and valid user credentials but no user interaction.
Technical Context
The vulnerability exists in the cv_upgrade_sensor_firmware API handler within Dell's ControlVault firmware management subsystem. CWE-787 (Out-of-bounds Write) indicates that the vulnerable code fails to properly validate input parameters or enforce buffer boundaries when processing API requests related to sensor firmware upgrades. This results in a write operation that accesses memory locations outside the intended buffer, potentially corrupting adjacent memory structures, heap metadata, or enabling code execution. The ControlVault products are hardware security modules/trusted platform management solutions, and the affected function is likely responsible for processing firmware upgrade payloads without adequate input validation or size checks. The API-based attack vector suggests the vulnerability can be triggered programmatically without requiring direct binary exploitation or kernel-level access.
Affected Products
Dell ControlVault3 (All versions prior to 5.15.10.14); Dell ControlVault 3 Plus (All versions prior to 6.2.26.36)
Remediation
Upgrade to version 5.15.10.14 or later; priority: Immediate Upgrade to version 6.2.26.36 or later; priority: Immediate Mitigation: Restrict local access to systems running ControlVault through strong access controls, privileged access management, and monitoring of API calls to cv_upgrade_sensor_firmware function; priority: High Detection: Monitor system logs for failed/successful firmware upgrade attempts via ControlVault API; implement behavioral analytics to detect abnormal API call patterns with malformed payloads; priority: High Workaround: Disable sensor firmware upgrade functionality if not actively required, subject to operational constraints; priority: Medium
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18302