Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31361: CWE-908 Use of Uninitialized Resource in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-31361cvecve-2025-31361cwe-908
Published: Mon Nov 17 2025 (11/17/2025, 22:54:06 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

A privilege escalation vulnerability exists in the ControlVault WBDI Driver WBIO_USH_ADD_RECORD functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to privilege escalation. An attacker can issue an api call to trigger this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:00:13 UTC

Technical Analysis

CVE-2025-31361 is a privilege escalation vulnerability identified in the ControlVault WBDI Driver, specifically within the WBIO_USH_ADD_RECORD functionality of Dell ControlVault3 and ControlVault3 Plus drivers that interface with Broadcom BCM5820X hardware. The vulnerability stems from the use of an uninitialized resource (CWE-908), which can be manipulated by an attacker through a specially crafted WinBioControlUnit API call. This call can be issued by a user with limited privileges (PR:L) and does not require user interaction (UI:N), but it requires local access (AV:L). The vulnerability has a CVSS 3.1 base score of 8.7, indicating high severity, with a scope change (S:C) that affects confidentiality and integrity at a high level and availability at a low level. Exploiting this flaw allows an attacker to escalate privileges on affected systems, potentially gaining administrative or SYSTEM-level access. The affected products are Dell ControlVault3 prior to version 5.15.14.19 and ControlVault3 Plus prior to 6.2.36.47, which are embedded security modules used in Dell enterprise laptops and desktops to manage biometric authentication and secure key storage. No patches or exploits in the wild are currently reported, but the vulnerability poses a significant risk due to the critical nature of privilege escalation in endpoint security. The vulnerability was reserved in April 2025 and published in November 2025, with no direct patch links available yet. The broad use of Dell ControlVault in enterprise environments makes this a notable threat vector for attackers aiming to bypass security controls and gain persistent elevated access.

Potential Impact

The primary impact of CVE-2025-31361 is unauthorized privilege escalation on affected Dell systems using ControlVault3 and ControlVault3 Plus drivers. Successful exploitation allows attackers with limited local privileges to gain elevated rights, potentially SYSTEM or administrative level, enabling them to bypass security controls, install persistent malware, access sensitive data, and disrupt system integrity. This compromises confidentiality and integrity severely, with some impact on availability. The vulnerability could be leveraged in targeted attacks against enterprise endpoints, facilitating lateral movement and persistence within corporate networks. Organizations relying on Dell hardware with these drivers, especially in sectors with sensitive data such as finance, healthcare, government, and critical infrastructure, face increased risk of sophisticated attacks. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the potential for future exploitation once proof-of-concept code becomes available. The requirement for local access limits remote exploitation but insider threats or malware with local foothold could exploit this vulnerability effectively.

Mitigation Recommendations

1. Monitor Dell security advisories closely and apply updated ControlVault3 and ControlVault3 Plus driver versions as soon as they are released to address CVE-2025-31361. 2. Restrict local user privileges rigorously to minimize the number of users who can execute WinBioControlUnit API calls or access ControlVault driver interfaces. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious API calls or privilege escalation attempts related to ControlVault components. 4. Employ strict physical and logical access controls to prevent unauthorized local access to critical endpoints. 5. Conduct regular audits of local user accounts and privileges to identify and remediate excessive permissions. 6. Use multi-factor authentication and biometric security features carefully, ensuring they are updated and configured securely to reduce attack surface. 7. Prepare incident response plans to quickly contain and remediate privilege escalation incidents involving ControlVault vulnerabilities. 8. Consider network segmentation to limit lateral movement if a local compromise occurs. 9. Educate users and administrators about the risks of local privilege escalation and the importance of applying security updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-04-15T14:39:55.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691baab2bb922d22627c94fe

Added to database: 11/17/2025, 11:07:30 PM

Last enriched: 2/27/2026, 5:00:13 AM

Last updated: 3/23/2026, 3:37:58 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses