CVE-2025-36460

Dell · Dell Multiple Products

A high-severity vulnerability has been identified in the Dell ControlVault3 driver, affecting multiple Dell products.

Executive summary

A high-severity vulnerability has been identified in the Dell ControlVault3 driver, affecting multiple Dell products. This flaw could allow a local attacker to read or write to unauthorized memory locations, potentially leading to system compromise, privilege escalation, or a denial of service. Organizations are urged to apply the vendor-provided security updates to mitigate the risk of exploitation.

Vulnerability

The vulnerability consists of multiple out-of-bounds read and write flaws within the ControlVault WBDI Driver Broadcom Storage Adapter functionality. An attacker with local access to an affected system could send specially crafted input to the driver. This could trick the driver into accessing memory outside of its intended boundaries, allowing the attacker to either read sensitive data from system memory or write malicious code to be executed with higher privileges, leading to a full system takeover.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could lead to significant business impact, including unauthorized elevation of privileges, allowing a standard user to gain administrative control over the affected system. This could result in the compromise of sensitive corporate data, deployment of ransomware, system instability, or the use of the compromised machine to launch further attacks within the network. The widespread nature of Dell products in enterprise environments elevates the potential risk across the organization.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by Dell immediately. All system administrators should identify affected assets and deploy the patched Dell ControlVault3 driver (version 5 or later) as a top priority.

Proactive Monitoring: Security teams should monitor for signs of exploitation, which may include unexpected system crashes or reboots, and anomalous activity from the ControlVault driver processes. Review Windows Event Logs for security events related to privilege escalation (e.g., Event ID 4672) and unexpected process creation by system-level services.

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. This includes enforcing the principle of least privilege to limit the capabilities of user accounts, utilizing Endpoint Detection and Response (EDR) tools to detect and block suspicious driver interactions and privilege escalation techniques, and implementing application whitelisting to prevent the execution of unauthorized code.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity score (CVSS 7.3) and the potential for complete system compromise via privilege escalation, it is strongly recommended that organizations prioritize the patching of this vulnerability. Although there is no evidence of active exploitation, the risk profile will increase as security researchers and threat actors begin to analyze the flaw. All Dell systems running the affected ControlVault3 driver versions should be updated without delay to prevent future compromise.