CVE-2025-36462

Dell · Dell Multiple Products

A high-severity vulnerability has been identified in the Dell ControlVault3 driver, affecting multiple Dell products.

Executive summary

A high-severity vulnerability has been identified in the Dell ControlVault3 driver, affecting multiple Dell products. This flaw could allow a local attacker to read or write to unauthorized memory locations, potentially leading to system compromise, data theft, or a denial of service. Organizations are urged to apply the vendor-provided security updates immediately to mitigate the risk of exploitation.

Vulnerability

The vulnerability consists of multiple out-of-bounds read and write flaws within the ControlVault WBDI Driver's Broadcom Storage Adapter functionality. An attacker with local access to a vulnerable system can send specially crafted input to the driver. This action can cause the driver to access memory outside of its intended boundaries, leading to two primary outcomes: reading sensitive data from system memory (e.g., credentials, encryption keys) or writing arbitrary data, which could be leveraged to execute malicious code with elevated privileges or cause a system crash (Denial of Service).

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could have a significant business impact by allowing an attacker to escalate privileges on a compromised endpoint. This could lead to unauthorized access to sensitive corporate data, the deployment of ransomware, or the establishment of a persistent foothold within the network. The potential consequences include data breaches, financial loss, operational disruption, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by Dell to upgrade the ControlVault3 software to version 5 or later. After patching, it is crucial to monitor systems for any signs of post-patch exploitation attempts and review system and security logs for indicators of compromise that may have occurred prior to remediation.

Proactive Monitoring: Security teams should monitor for anomalous system behavior on endpoints running the vulnerable driver. This includes looking for unexpected driver or system crashes in Windows Event Logs, monitoring for unusual process activity associated with the ControlVault service, and using Endpoint Detection and Response (EDR) tools to detect suspicious memory access patterns or privilege escalation techniques.

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. These include enforcing the principle of least privilege to limit the capabilities of user accounts, utilizing application whitelisting to prevent the execution of unauthorized code, and ensuring that EDR solutions are deployed and properly configured to detect and block memory-based attacks.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high severity rating (CVSS 7.3) and the potential for local privilege escalation, it is strongly recommended that all organizations using affected Dell products treat this vulnerability with high priority. The immediate application of vendor-supplied patches is the most effective course of action to prevent potential exploitation. While there is no current evidence of active attacks, the risk will increase if a public exploit becomes available. Proactive patching is essential to maintain a strong security posture.