Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24919: CWE-502 Deserialization of Untrusted Data in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-24919cvecve-2025-24919cwe-502
Published: Fri Jun 13 2025 (06/13/2025, 21:48:29 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

A deserialization of untrusted input vulnerability exists in the cvhDecapsulateCmd functionality of Dell ControlVault3 prior to 5.15.10.14 and ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault response to a command can lead to arbitrary code execution. An attacker can compromise a ControlVault firmware and have it craft a malicious response to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:22:14 UTC

Technical Analysis

CVE-2025-24919 is a deserialization of untrusted data vulnerability (CWE-502) found in the cvhDecapsulateCmd functionality of Dell ControlVault3 firmware versions prior to 5.15.10.14 and ControlVault3 Plus prior to 6.2.26.36, which run on Broadcom BCM5820X chipsets. The vulnerability occurs when the ControlVault firmware improperly processes serialized data received in response to commands, allowing specially crafted malicious responses to be deserialized in an unsafe manner. An attacker who has already compromised the ControlVault firmware can exploit this flaw to execute arbitrary code within the ControlVault environment. This can lead to a complete compromise of the ControlVault security subsystem, which is responsible for secure authentication and cryptographic operations on Dell systems. The vulnerability has a CVSS 3.1 score of 8.1, indicating high severity, with a vector indicating local attack vector, high attack complexity, no privileges required, no user interaction, and a scope change that affects confidentiality, integrity, and availability. Although no public exploits are known, the potential for firmware-level compromise poses a serious risk to system security, enabling attackers to bypass hardware-based security controls and potentially persist undetected. The vulnerability affects Dell systems utilizing Broadcom BCM5820X chipsets with vulnerable ControlVault firmware versions, which are commonly found in enterprise laptops and workstations. The lack of available patches at the time of publication necessitates proactive mitigation and monitoring strategies.

Potential Impact

For European organizations, this vulnerability threatens the security of Dell enterprise hardware that relies on Broadcom BCM5820X chipsets with vulnerable ControlVault firmware. Successful exploitation could allow attackers to execute arbitrary code at the firmware level, undermining hardware-based security features such as secure authentication, encryption key storage, and trusted platform modules. This could lead to unauthorized access to sensitive data, credential theft, and persistent footholds within critical systems. The compromise of ControlVault firmware can also disrupt system availability or integrity, impacting business operations. Sectors such as finance, government, healthcare, and critical infrastructure, which rely heavily on secure authentication and hardware security modules, are particularly at risk. The local attack vector and high attack complexity somewhat limit remote exploitation, but insider threats or supply chain attacks could leverage this vulnerability. The absence of known exploits provides a window for mitigation but also indicates the need for vigilance as attackers may develop exploits targeting this flaw.

Mitigation Recommendations

1. Monitor Dell and Broadcom advisories closely for firmware updates addressing CVE-2025-24919 and apply patches immediately upon release. 2. Implement strict supply chain security measures to prevent firmware tampering during manufacturing or distribution. 3. Employ hardware attestation and integrity verification tools to detect unauthorized modifications to ControlVault firmware. 4. Restrict local access to systems with vulnerable ControlVault firmware to trusted personnel only, reducing risk of local exploitation. 5. Enhance logging and monitoring of ControlVault communications and system firmware behavior to identify anomalous or malicious responses indicative of exploitation attempts. 6. Consider deploying endpoint detection and response (EDR) solutions capable of detecting firmware-level anomalies. 7. Conduct regular security audits and penetration testing focusing on hardware security modules and firmware components. 8. Educate IT and security teams about the risks associated with firmware vulnerabilities and the importance of timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-02-20T15:43:53.955Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684ca06aa8c921274380fa59

Added to database: 6/13/2025, 10:04:26 PM

Last enriched: 11/4/2025, 2:22:14 AM

Last updated: 11/22/2025, 12:11:57 PM

Views: 683

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats