CVE-2025-25050: CWE-787 Out-of-bounds Write in Broadcom BCM5820X

High
VulnerabilityCVE-2025-25050cvecve-2025-25050cwe-787
Published: Fri Jun 13 2025 (06/13/2025, 21:03:18 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call can lead to an out-of-bounds write. An attacker can issue an API call to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 06/13/2025, 21:19:45 UTC

Technical Analysis

CVE-2025-25050 is a high-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting the Broadcom BCM5820X component, specifically within the Dell ControlVault3 and Dell ControlVault 3 Plus products. The vulnerability resides in the cv_upgrade_sensor_firmware functionality, where a specially crafted API call to the ControlVault can trigger an out-of-bounds write condition. This type of vulnerability occurs when a program writes data outside the boundaries of allocated memory buffers, potentially leading to memory corruption, arbitrary code execution, or system crashes. The affected Dell ControlVault3 versions are prior to 5.15.10.14 and Dell ControlVault 3 Plus versions prior to 6.2.26.36. Exploitation requires local privileges (PR:L) but no user interaction (UI:N), and the attack vector is local (AV:L), meaning the attacker must have some level of access to the system to issue the malicious API call. The vulnerability impacts confidentiality, integrity, and availability (all rated high), with a CVSS v3.1 base score of 8.8, indicating a severe risk. The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component, potentially compromising the entire system. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be treated with urgency given its potential impact. The Broadcom BCM5820X is a hardware component embedded in Dell ControlVault security modules, which are used for secure authentication and cryptographic operations, often in enterprise environments. Compromise of this component could allow attackers to bypass security controls, escalate privileges, or execute arbitrary code at a low level, undermining the security of the host system.

Potential Impact

For European organizations, the impact of CVE-2025-25050 is significant, especially for enterprises relying on Dell hardware with ControlVault3 modules for secure authentication and cryptographic functions. Successful exploitation could lead to unauthorized access to sensitive data, credential theft, or persistent footholds within critical infrastructure. Given that ControlVault modules are often used in laptops and servers for hardware-based security, this vulnerability could undermine endpoint security, leading to broader network compromise. The high integrity and availability impact means attackers could alter or disrupt security functions, potentially disabling protections or causing denial of service. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies across Europe. Additionally, the local attack vector implies that initial access is required, so this vulnerability could be leveraged in multi-stage attacks where an attacker gains limited access and then escalates privileges or moves laterally. The absence of known exploits in the wild currently provides a window for mitigation, but the public disclosure increases the risk of rapid exploit development.

Mitigation Recommendations

1. Immediate patching: Organizations should prioritize updating Dell ControlVault3 firmware to versions 5.15.10.14 or later and Dell ControlVault 3 Plus to 6.2.26.36 or later as soon as patches become available. 2. Restrict local access: Limit local user privileges and restrict access to systems with vulnerable ControlVault modules to trusted personnel only. 3. Monitor API calls: Implement monitoring and logging of ControlVault API calls to detect anomalous or unauthorized usage patterns that could indicate exploitation attempts. 4. Harden endpoint security: Employ endpoint detection and response (EDR) solutions capable of detecting memory corruption or unusual process behavior related to ControlVault components. 5. Network segmentation: Isolate critical systems using ControlVault modules to reduce the risk of lateral movement if an endpoint is compromised. 6. Incident response readiness: Prepare for potential exploitation by updating incident response plans to include detection and containment strategies for ControlVault-related attacks. 7. Vendor engagement: Maintain communication with Dell and Broadcom for timely updates, patches, and guidance. 8. Firmware integrity verification: Where possible, verify the integrity of ControlVault firmware to detect unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-02-06T16:31:05.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684c925aa8c921274380f112

Added to database: 6/13/2025, 9:04:26 PM

Last enriched: 6/13/2025, 9:19:45 PM

Last updated: 6/14/2025, 12:10:13 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats