Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models
Identity

Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models

userBy userAugust 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 9, 2025Ravi LakshmananVulnerability/Hardware Security

Cybersecurity researchers have discovered multiple security flaws in Dell’s ControlVault3 firmware and related Windows APIs that may have been abused by attackers, maintain access even after installing a fresh operating system bypassing Windows logins, extracting encryption keys, and deploying malicious implants that are not detected in the firmware.

The vulnerability is known by Cisco Talos as Codename Revort. Over 100 models of Dell laptops running the Broadcom BCM5820X series chip will be affected. There is no evidence that the vulnerability is being exploited in the wild.

Industry that need to increase security when logging in via smart card readers or near field communication (NFC) readers may use ControlVault devices in their settings. ControlVault is a hardware-based security solution that provides a secure way to store passwords, biometric templates and security codes within firmware.

An attacker can maintain the persistence of a compromised system that is presented in a Black Hat USA security conference by escalating privileges after initial access, bypassing authentication controls, and withstanding operating system updates or reinstalls.

Together, these vulnerabilities create a powerful remote post-compromise persistence method for hidden access to high-value environments. The identified vulnerabilities are:

CVE-2025-25050 (CVSS score: 8.8) – An out-of-bounds write vulnerability exists in the cv_upgrade_sensor_firmware functionality that could lead to an out-of-bounds write CVE-2025-25215 (CVSS score: 8.8) – An arbitrary free vulnerability exists in the cv_close functionality that could lead to an arbitrary free CVE-2025-24922 (CVSS score: 8.8) – The SecureBio_Identify feature has a stack-based buffer overflow vulnerability in the SecureBio_Identify feature that can lead to arbitrary code execution (CVSS score: 8.4) – Reads CV_DBLOCKDATA vulnerability. CVE-2025-24919 (CVSS score: 8.1) – CVHDecapsulateCMD functionality that can lead to arbitrary code execution has a need to remove untrusted input vulnerabilities

Identity Security Risk Assessment

Cybersecurity companies also point out that local attackers with physical access to their users’ laptops can pry it open and access a unified security hub (USH) board, allowing attackers to exploit any of the five vulnerabilities without logging in or owning a full disk encryption password.

“Revault Attack can be used as a post-conflict persistence technology that can remain for the entire Windows reinstall,” said Philippe Laulheret, a researcher at Cisco Talos. “Revault attacks can also be used as a physical compromise for local users to bypass Windows logins or gain administrative/system privileges.”

To mitigate the risks posed by these defects, users are encouraged to apply the fixes provided by Dell. If you disable the ControlVault service and do not use peripherals such as fingerprint readers, smart card readers, or near field communication (NFC) readers. Turn off fingerprint login in high-risk situations.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure
Next Article Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks
user
  • Website

Related Posts

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

August 9, 2025

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

August 9, 2025

Cyberark and HashiCorp flaws allow remote vault takeover without credentials

August 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

Cyberark and HashiCorp flaws allow remote vault takeover without credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.