Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25050: CWE-787 Out-of-bounds Write in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-25050cvecve-2025-25050cwe-787
Published: Fri Jun 13 2025 (06/13/2025, 21:03:18 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call can lead to an out-of-bounds write. An attacker can issue an API call to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:22:43 UTC

Technical Analysis

CVE-2025-25050 is an out-of-bounds write vulnerability classified under CWE-787, affecting the cv_upgrade_sensor_firmware functionality within Dell ControlVault3 prior to version 5.15.10.14 and Dell ControlVault 3 Plus prior to 6.2.26.36. The underlying hardware involved is the Broadcom BCM5820X chip, which is embedded in these Dell security modules. The vulnerability arises when a local attacker with limited privileges issues a specially crafted API call to the ControlVault firmware upgrade interface, causing an out-of-bounds write in memory. This memory corruption can lead to arbitrary code execution within the ControlVault environment, potentially allowing the attacker to escalate privileges, compromise firmware integrity, and disrupt system availability. The vulnerability does not require user interaction but does require local access with some privileges, making it a significant risk in environments where multiple users have limited system access. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required. No patches or exploits are currently publicly available, but the vulnerability has been officially published and reserved since early 2025. The ControlVault modules are security co-processors used in Dell enterprise laptops and desktops to protect cryptographic keys and biometric data, so compromise here can undermine endpoint security at a fundamental level.

Potential Impact

For European organizations, this vulnerability poses a serious threat to endpoint security, especially in sectors relying heavily on Dell enterprise hardware such as finance, government, healthcare, and critical infrastructure. Successful exploitation could allow attackers to bypass firmware-level protections, extract sensitive cryptographic keys, or implant persistent malware within the ControlVault environment, leading to long-term compromise. The impact extends to confidentiality breaches of sensitive data, integrity violations through firmware tampering, and availability disruptions if the ControlVault firmware is corrupted. Given the widespread use of Dell hardware in European enterprises and public sector organizations, this vulnerability could facilitate targeted attacks or insider threats. The requirement for local privileges limits remote exploitation but does not eliminate risk in multi-user or shared device environments. The lack of current public exploits reduces immediate risk but also means organizations must proactively patch once updates are available to prevent future exploitation.

Mitigation Recommendations

Organizations should monitor Dell’s official security advisories for firmware or software updates addressing this vulnerability and apply them promptly once released. Until patches are available, restrict access to ControlVault APIs and interfaces to trusted administrators only, minimizing the risk of local attackers triggering the vulnerability. Implement strict endpoint access controls and user privilege management to prevent unauthorized local access. Employ endpoint detection and response (EDR) solutions capable of monitoring unusual ControlVault API calls or firmware upgrade attempts. Conduct regular audits of device firmware integrity and verify ControlVault firmware versions to identify vulnerable systems. For highly sensitive environments, consider isolating or limiting use of affected Dell hardware until remediation is confirmed. Additionally, educate IT staff about the vulnerability specifics to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-02-06T16:31:05.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684c925aa8c921274380f112

Added to database: 6/13/2025, 9:04:26 PM

Last enriched: 11/4/2025, 2:22:43 AM

Last updated: 11/21/2025, 5:36:35 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats