CVE-2025-31361

8.7 HIGH

📋 TL;DR

A privilege escalation vulnerability in Dell ControlVault3 and ControlVault3 Plus biometric drivers allows attackers to gain elevated system privileges through a specially crafted WinBioControlUnit API call. This affects systems running vulnerable versions of these drivers, potentially compromising Windows systems with biometric authentication enabled.

💻 Affected Systems

Products:
  • Dell ControlVault3
  • Dell ControlVault3 Plus
Versions: ControlVault3 prior to 5.15.14.19, ControlVault3 Plus prior to 6.2.36.47
Operating Systems: Windows (with biometric authentication support)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires biometric authentication functionality to be present/enabled. Affects Dell systems with fingerprint readers or other biometric hardware.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM/administrator privileges, enabling installation of malware, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, access sensitive data, and execute arbitrary code with elevated privileges.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on target system first.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can exploit this to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to make WinBioControlUnit API calls, typically requiring some level of initial access. Technical details are public but no known exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ControlVault3: 5.15.14.19 or later, ControlVault3 Plus: 6.2.36.47 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000326061/dsa-2025-228

Restart Required: Yes

Instructions:

1. Download latest driver from Dell Support site. 2. Run installer with administrative privileges. 3. Restart system when prompted. 4. Verify driver version in Device Manager.

🔧 Temporary Workarounds

Disable biometric authentication

windows

Temporarily disable biometric authentication features to prevent exploitation

Disable via Windows Settings > Accounts > Sign-in options > Windows Hello

Restrict WinBioControlUnit API access

windows

Apply application control policies to restrict access to vulnerable API

Configure via Windows Defender Application Control or AppLocker policies

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users run with minimal necessary permissions
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager > Biometric devices > ControlVault3 properties > Driver tab

Check Version:

wmic path Win32_PnPSignedDriver where "DeviceName like '%ControlVault%'" get DeviceName, DriverVersion

Verify Fix Applied:

Verify driver version is 5.15.14.19 or later for ControlVault3, or 6.2.36.47 or later for ControlVault3 Plus

📡 Detection & Monitoring

Log Indicators:

  • Unusual WinBioControlUnit API calls
  • Privilege escalation events in Windows Security logs
  • Driver loading anomalies

Network Indicators:

  • Not network exploitable - local privilege escalation only

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%winbio%' OR CommandLine LIKE '%WinBioControlUnit%') AND NewProcessName LIKE '%cmd%' OR NewProcessName LIKE '%powershell%'

🔗 References

📤 Share & Export