Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36553: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-36553cvecve-2025-36553cwe-120
Published: Mon Nov 17 2025 (11/17/2025, 22:26:32 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

A buffer overflow vulnerability exists in the CvManager functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted ControlVault API call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:52:30 UTC

Technical Analysis

CVE-2025-36553 is a classic buffer overflow vulnerability (CWE-120) found in the CvManager functionality of Dell ControlVault3 and ControlVault3 Plus firmware embedded in Broadcom BCM5820X devices. The vulnerability arises from improper bounds checking during a buffer copy operation triggered by a specially crafted ControlVault API call. This flaw allows an attacker with low privileges (local access) to cause memory corruption, potentially leading to arbitrary code execution or system compromise. The vulnerability affects Dell ControlVault3 versions prior to 5.15.14.19 and ControlVault3 Plus prior to 6.2.36.47. The CVSS v3.1 score of 8.8 reflects its high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The scope is considered changed (S:C) because exploitation can affect components beyond the initial vulnerable module. Although no public exploits are known yet, the vulnerability's nature and severity make it a critical concern for affected systems. ControlVault modules are used for secure key storage and cryptographic operations, so exploitation could undermine hardware-based security guarantees. The lack of available patches at the time of publication necessitates urgent attention from affected organizations. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of systems relying on Dell ControlVault3 hardware security modules embedded with Broadcom BCM5820X chips. Successful exploitation can lead to full compromise of sensitive cryptographic keys and credentials stored within the ControlVault, undermining device authentication, encryption, and secure boot processes. This can result in unauthorized data access, persistent malware implantation, and disruption of critical services. Sectors such as finance, government, telecommunications, and critical infrastructure that depend on hardware-based security for compliance and operational integrity are particularly vulnerable. The vulnerability's local attack vector means that attackers need some level of access, but given the widespread use of Dell enterprise hardware in European data centers and offices, insider threats or lateral movement by attackers could leverage this flaw. The high severity and potential for complete system compromise make this a critical issue for European cybersecurity posture.

Mitigation Recommendations

1. Monitor Dell and Broadcom advisories closely for official patches or firmware updates addressing CVE-2025-36553 and apply them immediately upon release. 2. Implement strict access controls to limit local access to systems with affected ControlVault hardware, reducing the risk of exploitation. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous ControlVault API calls or memory corruption indicators. 4. Conduct regular security audits and penetration tests focusing on hardware security modules and firmware integrity. 5. Where possible, isolate critical systems using affected hardware within segmented network zones to contain potential breaches. 6. Engage with Dell support to obtain interim mitigation guidance or firmware workarounds if patches are delayed. 7. Educate system administrators and security teams about the vulnerability and signs of exploitation to enhance detection capabilities. 8. Review and harden physical security controls to prevent unauthorized local access to vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-04-29T21:10:59.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ba3aabb922d226272e03e

Added to database: 11/17/2025, 10:37:30 PM

Last enriched: 11/17/2025, 10:52:30 PM

Last updated: 11/18/2025, 9:59:33 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats