Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models
Identity

Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models

userBy userAugust 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 9, 2025Ravi LakshmananVulnerability/Hardware Security

Cybersecurity researchers have discovered multiple security flaws in Dell’s ControlVault3 firmware and related Windows APIs that may have been abused by attackers, maintain access even after installing a fresh operating system bypassing Windows logins, extracting encryption keys, and deploying malicious implants that are not detected in the firmware.

The vulnerability is known by Cisco Talos as Codename Revort. Over 100 models of Dell laptops running the Broadcom BCM5820X series chip will be affected. There is no evidence that the vulnerability is being exploited in the wild.

Industry that need to increase security when logging in via smart card readers or near field communication (NFC) readers may use ControlVault devices in their settings. ControlVault is a hardware-based security solution that provides a secure way to store passwords, biometric templates and security codes within firmware.

An attacker can maintain the persistence of a compromised system that is presented in a Black Hat USA security conference by escalating privileges after initial access, bypassing authentication controls, and withstanding operating system updates or reinstalls.

Together, these vulnerabilities create a powerful remote post-compromise persistence method for hidden access to high-value environments. The identified vulnerabilities are:

CVE-2025-25050 (CVSS score: 8.8) – An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality that could lead to an out-of-bounds write CVE-2025-25215 (CVSS score: 8.8) – An arbitrary free vulnerability exists in the cv_close functionality that could lead to an arbitrary free CVE-2025-24922 (CVSS score: 8.8) – The SecureBio_Identify feature has a stack-based buffer overflow vulnerability in the SecureBio_Identify feature that can lead to arbitrary code execution (CVSS score: 8.4) – Reads CV_DBLOCKDATA vulnerability. CVE-2025-24919 (CVSS score: 8.1) – CVHDecapsulateCMD functionality that can lead to arbitrary code execution has a need to remove untrusted input vulnerabilities

Identity Security Risk Assessment

Cybersecurity companies also point out that local attackers with physical access to their users’ laptops can pry it open and access a unified security hub (USH) board, allowing attackers to exploit any of the five vulnerabilities without logging in or owning a full disk encryption password.

“Revault Attack can be used as a post-conflict persistence technology that can remain for the entire Windows reinstall,” said Philippe Laulheret, a researcher at Cisco Talos. “Revault attacks can also be used as a physical compromise for local users to bypass Windows logins or gain administrative/system privileges.”

To mitigate the risks posed by these defects, users are encouraged to apply the fixes provided by Dell. If you disable the ControlVault service and do not use peripherals such as fingerprint readers, smart card readers, or near field communication (NFC) readers. Turn off fingerprint login in high-risk situations.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure
Next Article Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.