EUVD-2025-18302

| CVE-2025-25050 HIGH
2025-06-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2025-18302
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
CVE Published
Jun 13, 2025 - 21:15 nvd
HIGH 8.8

Description

An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call can lead to an out-of-bounds write. An attacker can issue an API call to trigger this vulnerability.

Analysis

CVE-2025-25050 is an out-of-bounds write vulnerability in Dell ControlVault3 and ControlVault 3 Plus that allows a local, authenticated attacker to trigger memory corruption through a specially crafted API call to the cv_upgrade_sensor_firmware function. An attacker with local access and low privileges can achieve high-impact compromise including complete confidentiality, integrity, and availability violations. The vulnerability affects all versions prior to ControlVault3 5.15.10.14 and ControlVault 3 Plus 6.2.26.36; exploitation requires local access and valid user credentials but no user interaction.

Technical Context

The vulnerability exists in the cv_upgrade_sensor_firmware API handler within Dell's ControlVault firmware management subsystem. CWE-787 (Out-of-bounds Write) indicates that the vulnerable code fails to properly validate input parameters or enforce buffer boundaries when processing API requests related to sensor firmware upgrades. This results in a write operation that accesses memory locations outside the intended buffer, potentially corrupting adjacent memory structures, heap metadata, or enabling code execution. The ControlVault products are hardware security modules/trusted platform management solutions, and the affected function is likely responsible for processing firmware upgrade payloads without adequate input validation or size checks. The API-based attack vector suggests the vulnerability can be triggered programmatically without requiring direct binary exploitation or kernel-level access.

Affected Products

Dell ControlVault3 (All versions prior to 5.15.10.14); Dell ControlVault 3 Plus (All versions prior to 6.2.26.36)

Remediation

Upgrade to version 5.15.10.14 or later; priority: Immediate Upgrade to version 6.2.26.36 or later; priority: Immediate Mitigation: Restrict local access to systems running ControlVault through strong access controls, privileged access management, and monitoring of API calls to cv_upgrade_sensor_firmware function; priority: High Detection: Monitor system logs for failed/successful firmware upgrade attempts via ControlVault API; implement behavioral analytics to detect abnormal API call patterns with malformed payloads; priority: High Workaround: Disable sensor firmware upgrade functionality if not actively required, subject to operational constraints; priority: Medium

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +44
POC: 0

Share

EUVD-2025-18302 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy