Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Posted on August 6, 2025August 6, 2025 By CWS

5 vulnerabilities within the ControlVault3 firmware and the related Home windows APIs expose thousands and thousands of Dell laptops to persistent implants and Home windows login bypasses by way of bodily entry, Cisco Talos reviews.

The problems, tracked as CVE-2025-24311, CVE-2025-25215, CVE-2025-24922, CVE-2025-25050, and CVE-2025-24919, had been initially disclosed on June 13, when Dell introduced that patches for them had been rolled out for over 100 Dell Professional, Latitude, and Precision fashions.

The affected part, ControlVault3 (and the ControlVault3+ iteration), is a hardware-based system meant to securely retailer passwords, biometric data, and safety codes.

CVE-2025-24311 and CVE-2025-25050 are out-of-bounds points that may very well be triggered by way of specifically crafted ControlVault API calls to leak data or write exterior the allotted reminiscence, whereas CVE-2025-25215 results in an arbitrary free by way of a crafted name and may be triggered by way of a cast session.

CVE-2025-24922 and CVE-2025-24919, a stack-based buffer overflow bug and a deserialization of untrusted enter vulnerability, can result in arbitrary code execution.

In line with Talos, an attacker that doesn’t have administrative privileges may work together with ControlVault by way of the related API and execute arbitrary code on the firmware, leaking delicate data affecting the safety of the machine, which may permit them to change the firmware.

“This creates the danger of a so-called implant that would keep unnoticed in a laptop computer’s CV firmware and finally be used as a pivot again onto the system within the case of a risk actor’s post-compromise technique,” Talos, which named the failings ReVault, says.

The safety agency additionally notes that an attacker with bodily entry to the machine may pry it open and entry the USH board, permitting the attacker to use any of the 5 vulnerabilities with out having to log in or know a full-disk encryption password.Commercial. Scroll to proceed studying.

“One other fascinating consequence of this situation is that if a system is configured to be unlocked with the consumer’s fingerprint, it’s also attainable to tamper with the CV firmware to simply accept any fingerprint fairly than solely permitting a reputable consumer’s,” Talos notes.

In line with Talos, the vulnerabilities may pose a severe risk to organizations in cybersecurity, authorities, and different delicate industries, the place strict login necessities improve the probability of ControlVault getting used.

Dell’s June advisory lists all of the affected fashions and susceptible firmware variations, in addition to the dates when patches had been launched for them.

Associated: Lenovo Firmware Vulnerabilities Permit Persistent Implant Deployment

Associated: Flaws in Gigabyte Firmware Permit Safety Bypass, Backdoor Deployment

Associated: Dell Says Knowledge Leaked by Hackers Is Faux

Associated: Vital OpenWrt Flaw Exposes Firmware Replace Server to Exploitation

Security Week News Tags:Bypass, Dell, Expose, Flaws, Implants, Laptop, Login, Models, Windows

Post navigation

Previous Post: Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders
Next Post: Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks

Related Posts

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News
Critical Citrix NetScaler Flaw Exploited as Zero-Day Security Week News
Why Scamming Can’t Be Stopped—But It Can Be Managed Security Week News
Nvidia Triton Vulnerabilities Pose Big Risk to AI Models Security Week News
Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News