CVE-2025-36461
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-17

Last updated on: 2025-11-18

Assigner: Talos

Description
Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability.Β This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 0 (`WBIO_USH_GET_TEMPLATE`) and with either and an invalid `ReceiveBuferSize` and/or an invalid `SendBufferSize`.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-17
Last Modified
2025-11-18
Generated
2026-05-06
AI Q&A
2025-11-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dell controlvault3 *
dell controlvault3_plus *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-805 The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves multiple out-of-bounds read and write issues in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 and Dell ControlVault3 Plus. Specifically, when a specially crafted WinBioControlUnit API call is made with certain parameters (ControlCode 0 and specific buffer sizes), it can cause memory corruption by writing up to 3 bytes out-of-bounds and reading up to 75 bytes out-of-bounds.


How can this vulnerability impact me? :

The vulnerability can lead to memory corruption, which may allow an attacker with limited privileges to execute arbitrary code, cause denial of service, or compromise the confidentiality, integrity, and availability of the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart