Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31361: CWE-908 Use of Uninitialized Resource in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-31361cvecve-2025-31361cwe-908
Published: Mon Nov 17 2025 (11/17/2025, 22:54:06 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

A privilege escalation vulnerability exists in the ControlVault WBDI Driver WBIO_USH_ADD_RECORD functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to privilege escalation. An attacker can issue an api call to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 12/02/2025, 00:12:36 UTC

Technical Analysis

CVE-2025-31361 is a vulnerability classified under CWE-908 (Use of Uninitialized Resource) found in the Broadcom BCM5820X chipset, specifically impacting the ControlVault WBDI Driver's WBIO_USH_ADD_RECORD functionality within Dell ControlVault3 and ControlVault3 Plus devices. The vulnerability allows an attacker with limited privileges to escalate their privileges by issuing a specially crafted WinBioControlUnit API call. The root cause is the use of an uninitialized resource in the driver code, which leads to undefined behavior that can be manipulated to gain elevated privileges. The vulnerability affects versions prior to 5.15.14.19 for Dell ControlVault3 and prior to 6.2.36.47 for ControlVault3 Plus. The CVSS v3.1 score is 8.7, indicating high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) that affects confidentiality and integrity highly (C:H/I:H) and availability to a lesser extent (A:L). This vulnerability can compromise the security of biometric authentication systems, potentially allowing attackers to bypass security controls and gain unauthorized access to sensitive systems. Although no known exploits are currently reported in the wild, the vulnerability’s characteristics make it a critical concern for organizations relying on affected hardware. The lack of available patches at the time of publication necessitates immediate risk mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-31361 is significant due to the widespread use of Dell hardware incorporating Broadcom BCM5820X chipsets in enterprise environments, especially in sectors relying on biometric authentication such as finance, government, and critical infrastructure. Successful exploitation can lead to privilege escalation, allowing attackers to bypass security controls, access sensitive data, and potentially move laterally within networks. This compromises confidentiality and integrity of systems and data, undermining trust in biometric security mechanisms. The vulnerability could facilitate advanced persistent threats (APTs) and insider attacks, increasing the risk of data breaches and operational disruptions. The local attack vector implies that attackers need some initial access, but the low complexity and no user interaction required make it easier to exploit once inside. This elevates the threat level for organizations with remote access or insider threat risks. The scope change in the vulnerability means that the impact extends beyond the vulnerable component, potentially affecting the entire system’s security posture.

Mitigation Recommendations

1. Monitor and restrict access to the WinBioControlUnit API to trusted processes and users only, using application whitelisting and strict access controls. 2. Implement enhanced logging and alerting for unusual or unauthorized calls to the WBIO_USH_ADD_RECORD function to detect exploitation attempts early. 3. Apply vendor patches and firmware updates as soon as they become available from Dell and Broadcom to remediate the vulnerability. 4. Conduct thorough audits of systems using Dell ControlVault3 and ControlVault3 Plus devices to identify and isolate vulnerable hardware. 5. Employ network segmentation to limit the ability of attackers to reach vulnerable devices from less secure network zones. 6. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 7. Use endpoint detection and response (EDR) tools to identify suspicious privilege escalation behaviors related to biometric driver exploitation. 8. Consider temporary disabling or restricting biometric authentication features if patching is delayed and risk is high, balancing security and usability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-04-15T14:39:55.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691baab2bb922d22627c94fe

Added to database: 11/17/2025, 11:07:30 PM

Last enriched: 12/2/2025, 12:12:36 AM

Last updated: 1/7/2026, 4:54:30 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats