Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models

Posted on August 9, 2025August 10, 2025 By CWS

Aug 09, 2025Ravie LakshmananVulnerability / {Hardware} Safety
Cybersecurity researchers have uncovered a number of safety flaws in Dell’s ControlVault3 firmware and its related Home windows APIs that might have been abused by attackers to bypass Home windows login, extract cryptographic keys, in addition to keep entry even after a recent working system set up by deploying undetectable malicious implants into the firmware.
The vulnerabilities have been codenamed ReVault by Cisco Talos. Greater than 100 fashions of Dell laptops working Broadcom BCM5820X sequence chips are affected. There is no such thing as a proof that the vulnerabilities have been exploited within the wild.
Industries that require heightened safety when logging in, by way of good card readers or near-field communication (NFC) readers, are doubtless to make use of ControlVault gadgets of their settings. ControlVault is a hardware-based safety resolution that gives a safe option to retailer passwords, biometric templates, and safety codes throughout the firmware.
Attackers can chain the vulnerabilities, which had been offered on the Black Hat USA safety convention, to escalate their privileges after preliminary entry, bypass authentication controls, and keep persistence on compromised programs that survive working system updates or reinstallations.

Collectively, these vulnerabilities create a potent distant post-compromise persistence technique for covert entry to high-value environments. The recognized vulnerabilities are as follows –

CVE-2025-25050 (CVSS rating: 8.8) – An out-of-bounds write vulnerability exists within the cv_upgrade_sensor_firmware performance that might result in an out-of-bounds write
CVE-2025-25215 (CVSS rating: 8.8) – An arbitrary free vulnerability exists within the cv_close performance that might result in an arbitrary free
CVE-2025-24922 (CVSS rating: 8.8) – A stack-based buffer overflow vulnerability exists within the securebio_identify performance that might result in arbitrary code execution
CVE-2025-24311 (CVSS rating: 8.4) – An out-of-bounds learn vulnerability exists within the cv_send_blockdata performance that might result in an data leak
CVE-2025-24919 (CVSS rating: 8.1) – A deserialization of untrusted enter vulnerability exists within the cvhDecapsulateCmd performance that might result in arbitrary code execution

The cybersecurity firm additionally identified {that a} native attacker with bodily entry to a person’s laptop computer may pry it open and entry the Unified Safety Hub (USH) board, permitting an attacker to take advantage of any of the 5 vulnerabilities with out having to log in or possess a full-disk encryption password.
“The ReVault assault can be utilized as a post-compromise persistence method that may stay even throughout Home windows reinstalls,” Cisco Talos researcher Philippe Laulheret mentioned. “The ReVault assault may also be used as a bodily compromise to bypass Home windows Login and/or for any native person to achieve Admin/System privileges.”
To mitigate the chance posed by these flaws, customers are suggested to use the fixes offered by Dell; disable ControlVault companies if peripherals like fingerprint readers, good card readers, and near-field communication (NFC) readers are usually not getting used; and switch off fingerprint login in excessive threat conditions.

The Hacker News Tags:Attack, ControlVault3, Dell, Firmware, Laptop, Models, Researchers, ReVault, Reveal, Targeting

Post navigation

Previous Post: Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
Next Post: Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Related Posts

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities The Hacker News
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access The Hacker News
Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger The Hacker News
Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News