Malware and password vulnerabilities threaten Dell ControlVault3

Dell's credential storage security solution is vulnerable. Security updates are available.

listen Print view
A symbolic update button on a keyboard.

(Image: Artur Szczybylo/Shutterstock.com)

2 min. read


Various Dell computers running ControlVault 3 are vulnerable. To prevent potential attacks, administrators should update the application promptly.

Dell ControVault3 is a hardware-based security solution that stores access credentials such as passwords and biometric data. Attackers could now gain access to this data after successful attacks.

In a warning message, the computer manufacturer lists a total of seven security vulnerabilities. These are found in the Broadcom firmware and drivers. The post also lists the affected laptop models, such as Latitude 7330, Precision 7780, and Pro 13 Plus PB13250. The developers assure that ControlVault3 6.2.36.47 has been secured. All previous versions are vulnerable.

Two vulnerabilities (CVE-2025-36553 “high,” CVE-2025-32089 “high”) are considered the most dangerous, which attackers can exploit with a prepared ControlVault API call to the CvManager functionality. This leads to a buffer overflow, allowing malware to enter systems. After that, computers are generally considered fully compromised.

Another vulnerability (CVE-2025-31649) with a threat level of “high” can allow unauthorized access. The reason for this is a hardcoded password. Furthermore, attackers can gain higher privileges (CVE-2025-31361 “high”).

Videos by heise

So far, there are no reports of attackers exploiting the vulnerabilities. Because a password store is an extremely lucrative target for cybercriminals, administrators should install the security update quickly. Otherwise, after a successful attack, attackers can gain extensive access to company PCs.

Just recently, Dell developers closed security vulnerabilities in Alienware Command Center.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.