Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Posted on August 6, 2025August 6, 2025 By CWS

5 vulnerabilities within the ControlVault3 firmware and the related Home windows APIs expose thousands and thousands of Dell laptops to persistent implants and Home windows login bypasses by way of bodily entry, Cisco Talos reviews.

The problems, tracked as CVE-2025-24311, CVE-2025-25215, CVE-2025-24922, CVE-2025-25050, and CVE-2025-24919, had been initially disclosed on June 13, when Dell introduced that patches for them had been rolled out for over 100 Dell Professional, Latitude, and Precision fashions.

The affected part, ControlVault3 (and the ControlVault3+ iteration), is a hardware-based system meant to securely retailer passwords, biometric data, and safety codes.

CVE-2025-24311 and CVE-2025-25050 are out-of-bounds points that may very well be triggered by way of specifically crafted ControlVault API calls to leak data or write exterior the allotted reminiscence, whereas CVE-2025-25215 results in an arbitrary free by way of a crafted name and may be triggered by way of a cast session.

CVE-2025-24922 and CVE-2025-24919, a stack-based buffer overflow bug and a deserialization of untrusted enter vulnerability, can result in arbitrary code execution.

In line with Talos, an attacker that doesn’t have administrative privileges may work together with ControlVault by way of the related API and execute arbitrary code on the firmware, leaking delicate data affecting the safety of the machine, which may permit them to change the firmware.

“This creates the danger of a so-called implant that would keep unnoticed in a laptop computer’s CV firmware and finally be used as a pivot again onto the system within the case of a risk actor’s post-compromise technique,” Talos, which named the failings ReVault, says.

The safety agency additionally notes that an attacker with bodily entry to the machine may pry it open and entry the USH board, permitting the attacker to use any of the 5 vulnerabilities with out having to log in or know a full-disk encryption password.Commercial. Scroll to proceed studying.

“One other fascinating consequence of this situation is that if a system is configured to be unlocked with the consumer’s fingerprint, it’s also attainable to tamper with the CV firmware to simply accept any fingerprint fairly than solely permitting a reputable consumer’s,” Talos notes.

In line with Talos, the vulnerabilities may pose a severe risk to organizations in cybersecurity, authorities, and different delicate industries, the place strict login necessities improve the probability of ControlVault getting used.

Dell’s June advisory lists all of the affected fashions and susceptible firmware variations, in addition to the dates when patches had been launched for them.

Associated: Lenovo Firmware Vulnerabilities Permit Persistent Implant Deployment

Associated: Flaws in Gigabyte Firmware Permit Safety Bypass, Backdoor Deployment

Associated: Dell Says Knowledge Leaked by Hackers Is Faux

Associated: Vital OpenWrt Flaw Exposes Firmware Replace Server to Exploitation

Security Week News Tags:Bypass, Dell, Expose, Flaws, Implants, Laptop, Login, Models, Windows

Post navigation

Previous Post: Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders
Next Post: Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks

Related Posts

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes Security Week News
Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data Security Week News
Motors Theme Vulnerability Exploited to Hack WordPress Websites Security Week News
Swimlane Raises $45 Million for Security Automation Platform Security Week News
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People Security Week News
Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News