SB2025081112 - Multiple vulnerabilities in Dell ControlVault3 and ControlVault3 Plus



SB2025081112 - Multiple vulnerabilities in Dell ControlVault3 and ControlVault3 Plus

Published: August 11, 2025

Security Bulletin ID SB2025081112
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2025-24919)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data in the cvhDecapsulateCmd functionality. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Out-of-bounds write (CVE-ID: CVE-2025-25050)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the cv_upgrade_sensor_firmware functionality. A local user can use a specially crafted ControlVault API call, trigger an out-of-bounds write and execute arbitrary code on the target system.


3) Out-of-bounds read (CVE-ID: CVE-2025-24311)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the cv_send_blockdata functionality. A local user can use a specially crafted ControlVault API call, trigger an out-of-bounds read error and read contents of memory on the system.


4) Stack-based buffer overflow (CVE-ID: CVE-2025-24922)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the securebio_identify functionality. A local user can use a specially crafted malicious cv_object, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Release of invalid pointer or reference (CVE-ID: CVE-2025-25215)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the arbitrary free issue in in the cv_close functionality. A local user can use a specially crafted ControlVault API call and cause arbitrary free on the target system.


Remediation

Install update from vendor's website.