Cybersecurity researchers have identified critical vulnerabilities in Dellβs ControlVault3 firmware that can be exploited to bypass Windows login, extract cryptographic keys, and maintain persistent, undetectable access. These flaws, dubbed ReVault by Cisco Talos, affect over 100 Dell laptop models and can be exploited physically or remotely, posing significant security risks. #DellControlVault3 #ReVault #CiscoTalos
Keypoints
- Multiple security flaws were discovered in Dellβs ControlVault3 firmware that could be exploited for persistent access.
- The vulnerabilities include out-of-bounds writes, buffer overflows, and arbitrary code execution, with high severity scores.
- Attackers can leverage these flaws to escalate privileges, bypass authentication, and remain undetected after system reinstalls.
- Physical access to devices enables exploitation of vulnerabilities without the need for login credentials.
- Mitigation strategies include applying Dellβs security patches, disabling ControlVault services, and turning off fingerprint login in sensitive scenarios.
Read More: https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html