Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36462: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-36462cvecve-2025-36462cwe-805
Published: Mon Nov 17 2025 (11/17/2025, 22:50:46 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 3 (`WBIO_USH_CREATE_CHALLENGE`) with an invalid `ReceiveBuferSize`.

AI-Powered Analysis

AILast updated: 11/17/2025, 23:16:09 UTC

Technical Analysis

CVE-2025-36462 is a vulnerability classified under CWE-805 (Buffer Access with Incorrect Length Value) affecting the Broadcom BCM5820X Storage Adapter functionality embedded within Dell ControlVault3 and ControlVault3 Plus devices prior to versions 5.15.14.19 and 6.2.36.47 respectively. The vulnerability is triggered by a specially crafted WinBioControlUnit API call, specifically when the ControlCode 3 (WBIO_USH_CREATE_CHALLENGE) is submitted with a ReceiveBuffer size greater than zero but less than four bytes. This causes the driver to write up to three null bytes beyond the end of the allocated ReceiveBuffer, resulting in out-of-bounds memory writes. Such memory corruption can lead to arbitrary code execution, privilege escalation, or system crashes, impacting confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score is 7.3, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). Although no known exploits are currently in the wild, the vulnerability poses a significant risk to systems using the affected Broadcom hardware and Dell ControlVault firmware. The vulnerability affects a specialized biometric authentication component, which is often integrated into enterprise security solutions, making it a critical concern for organizations relying on these devices for secure authentication and cryptographic operations.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. The affected Broadcom BCM5820X Storage Adapter is embedded in Dell ControlVault3 devices, which are commonly used in enterprise environments for secure biometric authentication and cryptographic key storage. Exploitation could allow attackers with local access to cause memory corruption, potentially leading to privilege escalation or denial of service. This could compromise sensitive biometric data, cryptographic keys, and authentication mechanisms, undermining the security posture of affected systems. Critical sectors such as finance, government, healthcare, and telecommunications, which rely heavily on strong authentication and data protection, could face operational disruptions and data breaches. Additionally, the requirement for local privileges and user interaction means insider threats or social engineering attacks could trigger exploitation. The lack of known public exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and monitoring.

Mitigation Recommendations

1. Apply firmware and driver updates from Dell and Broadcom as soon as they are released to address this vulnerability. 2. Restrict access to the WinBioControlUnit API and related biometric authentication interfaces to trusted users and processes only. 3. Implement strict endpoint security controls to prevent unauthorized local access, including limiting administrative privileges and enforcing strong user authentication. 4. Monitor system logs and biometric device activity for unusual or unexpected WinBioControlUnit calls, especially those involving ControlCode 3 with small ReceiveBuffer sizes. 5. Employ application whitelisting and behavior-based detection to identify attempts to exploit this vulnerability. 6. Educate users about the risks of social engineering that could lead to malicious API calls requiring user interaction. 7. Consider network segmentation and isolation of critical systems using Dell ControlVault devices to reduce exposure. 8. Coordinate with Dell support and security advisories to stay informed about patch availability and best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-04-15T21:17:08.089Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691baab2bb922d22627c950a

Added to database: 11/17/2025, 11:07:30 PM

Last enriched: 11/17/2025, 11:16:09 PM

Last updated: 11/18/2025, 9:01:36 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats