Article Details

Scrape Timestamp (UTC): 2025-08-10 08:13:46.619

Source: https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html

Original Article Text

Click to Toggle View

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models. Cybersecurity researchers have uncovered multiple security flaws in Dell's ControlVault3 firmware and its associated Windows APIs that could have been abused by attackers to bypass Windows login, extract cryptographic keys, as well as maintain access even after a fresh operating system install by deploying undetectable malicious implants into the firmware. The vulnerabilities have been codenamed ReVault by Cisco Talos. More than 100 models of Dell laptops running Broadcom BCM5820X series chips are affected. There is no evidence that the vulnerabilities have been exploited in the wild. Industries that require heightened security when logging in, via smart card readers or near-field communication (NFC) readers, are likely to use ControlVault devices in their settings. ControlVault is a hardware-based security solution that offers a secure way to store passwords, biometric templates, and security codes within the firmware. Attackers can chain the vulnerabilities, which were presented at the Black Hat USA security conference, to escalate their privileges after initial access, bypass authentication controls, and maintain persistence on compromised systems that survive operating system updates or reinstallations. Together, these vulnerabilities create a potent remote post-compromise persistence method for covert access to high-value environments. The identified vulnerabilities are as follows - The cybersecurity company also pointed out that a local attacker with physical access to a user's laptop could pry it open and access the Unified Security Hub (USH) board, allowing an attacker to exploit any of the five vulnerabilities without having to log in or possess a full-disk encryption password. "The ReVault attack can be used as a post-compromise persistence technique that can remain even across Windows reinstalls," Cisco Talos researcher Philippe Laulheret said. "The ReVault attack can also be used as a physical compromise to bypass Windows Login and/or for any local user to gain Admin/System privileges." To mitigate the risk posed by these flaws, users are advised to apply the fixes provided by Dell; disable ControlVault services if peripherals like fingerprint readers, smart card readers, and near-field communication (NFC) readers are not being used; and turn off fingerprint login in high risk situations.

Daily Brief Summary

VULNERABILITIES // ReVault Attack Exposes Critical Flaws in Dell ControlVault3 Firmware

Cisco Talos researchers identified critical vulnerabilities in Dell's ControlVault3 firmware, affecting over 100 laptop models with Broadcom BCM5820X series chips.

The ReVault attack allows bypassing Windows login, extracting cryptographic keys, and maintaining access even after OS reinstallations.

Vulnerabilities can be exploited by chaining attacks to escalate privileges, bypass authentication, and maintain persistence in high-value environments.

ControlVault, a hardware-based security solution, is used in industries requiring secure logins via smart card or NFC readers.

No evidence suggests these vulnerabilities have been exploited in the wild, but they pose a significant risk for industries relying on strict security protocols.

Mitigation measures include applying Dell's patches, disabling ControlVault services, and turning off fingerprint logins in high-risk scenarios.

The vulnerabilities were presented at Black Hat USA, emphasizing the need for proactive security measures in firmware management.