CVE-2025-36461

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to trigger memory corruption through specially crafted WinBioControlUnit API calls to Dell ControlVault biometric security components. Attackers can exploit out-of-bounds read/write vulnerabilities to potentially execute arbitrary code or cause system crashes. Affected systems include Dell devices with ControlVault3 or ControlVault3 Plus biometric security modules.

💻 Affected Systems

Products:
  • Dell ControlVault3
  • Dell ControlVault3 Plus
Versions: ControlVault3 prior to 5.15.14.19, ControlVault3 Plus prior to 6.2.36.47
Operating Systems: Windows (via WinBioControlUnit API)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Dell biometric security hardware with vulnerable driver versions. Exploitation requires ability to call WinBioControlUnit API.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution leading to complete control of affected systems, credential theft, and lateral movement within networks.

🟠

Likely Case

Local privilege escalation, denial of service, or information disclosure from memory corruption.

🟢

If Mitigated

Limited impact with proper patch management and restricted access controls preventing exploitation attempts.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on target system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this vulnerability for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of WinBioControlUnit API and ability to craft specific calls with invalid buffer sizes. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ControlVault3: 5.15.14.19+, ControlVault3 Plus: 6.2.36.47+

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000326061/dsa-2025-228

Restart Required: Yes

Instructions:

1. Download latest ControlVault driver from Dell Support. 2. Install updated driver package. 3. Restart system to complete installation.

🔧 Temporary Workarounds

Disable biometric authentication

windows

Temporarily disable ControlVault biometric functionality to prevent WinBioControlUnit calls

Restrict WinBioControlUnit API access

windows

Use application control policies to restrict access to biometric API functions

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from executing code on affected systems
  • Monitor for suspicious WinBioControlUnit API calls and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check ControlVault driver version in Device Manager under Biometric Devices or via Dell Command Update utility

Check Version:

wmic path Win32_PnPSignedDriver where "DeviceName like '%ControlVault%'" get DeviceName, DriverVersion

Verify Fix Applied:

Verify driver version is 5.15.14.19 or higher for ControlVault3, or 6.2.36.47 or higher for ControlVault3 Plus

📡 Detection & Monitoring

Log Indicators:

  • Failed WinBioControlUnit API calls with specific control codes
  • Biometric service crashes or unexpected restarts
  • Memory access violation events in system logs

Network Indicators:

  • Unusual local process communication with biometric services

SIEM Query:

EventID=1000 OR EventID=1001 AND SourceName='Application Error' AND ProcessName contains 'WinBio'

🔗 References

📤 Share & Export