Millions of Dell laptops could be persistently backdoored in ReVault attacks


A set of firmware vulnerabilities affecting 100+ Dell laptop models widely used in government settings and by the cybersecurity industry could allow attackers to achieve persistent access even across Windows reinstalls, Cisco Talos researchers have discovered.

About the vulnerabilities

Most of the flaws reside in the firmware for ControlVault3 and ControlVault3+, which are hardware security components that store passwords, biometric templates, and security codes.

The lists includes:

  • Two out-of-bounds vulnerabilities (CVE-2025-24311, CVE-2025-25050)
  • An arbitrary free (CVE-2025-25215) flaw
  • A stack-overflow bug (CVE-2025-24922)
  • An unsafe-deserialization flaw (CVE-2025-24919)

According to the researchers, the vulnerabilities can be exploited in so-called ReVault attacks by:

  • Attackers who have achieved non-administrative access/privileges on a vulnerable target laptop. The vulnerabilities may allow them to interact with the ControlVault firmware and leak key material that would allow them to permanently modify the firmware (i.e., effectively creating a potential backdoor into the system)
  • Attackers that have physical access to the laptop. They could pry the device open, use a custom connector to access the Unified Security Hub board (which runs ControlVault) over USB, and exploit those vulnerabilities – all without having to log into the system beforehand or having knowledge of the full-disk encryption password.

“Another interesting consequence of this scenario is that if a system is configured to be unlocked with the user’s fingerprint, it is also possible to tamper with the CV firmware to accept any fingerprint,” the researchers added.

Technical details have not been publicly shared, but they have, of course, been privately reported to Dell and Broadcom.

Update the firmware!

The vulnerabilities affect Dell ControlVault3 versions prior to v5.15.10.14 and Dell ControlVault3+ versions prior to 6.2.26.36 and the associated Windows drivers on the following Dell laptop models with Broadcom chips:

Dell Pro Max 14 MC14250Dell Pro Max 16 MC16250Dell Pro 13 Plus PB13250Dell Pro 14 Plus PB14250
Dell Pro 16 Plus PB16250Dell Pro Rugged 13 RA13250Dell Pro Rugged 14 RB14250Latitude 7030 Rugged Extreme Tablet
Latitude 7200 2-in-1Latitude 7210 2-in-1Latitude 7220EX Rugged Extreme TabletLatitude 7220 Rugged Extreme Tablet
Latitude 7230 Rugged Extreme TabletLatitude 5300 2-in-1Latitude 5300Latitude 5310 2-in-1
Latitude 5310Latitude 5320Latitude 5330Latitude 5340
Latitude 5350Latitude 7300Latitude 7310Latitude 7320
Latitude 7320 DetachableLatitude 7330Latitude 7330 Rugged ExtremeLatitude 7340
Latitude 7350Latitude 7350 DetachableLatitude 9330Latitude 5400
Latitude 5401Latitude 5410Latitude 5411Latitude 5421
Latitude 5430 RuggedLatitude 5431Latitude 5440Latitude 5450
Latitude 7400 2-in-1Latitude 7400Latitude 7410Latitude 7420
Latitude 7430Latitude 7440Latitude 7450Latitude 9410
Latitude 9420Latitude 9430Latitude 9440 2-in-1Latitude 9450 2-in-1
Latitude 5500Latitude 5501Latitude 5510Latitude 5511
Latitude 5520Latitude 5521Latitude 5530Latitude 5531
Latitude 5540Latitude 5550Latitude 7520Latitude 7530
Latitude 9510Latitude 9520Latitude 7640Latitude 7650
Latitude 5420Latitude 5430Precision 3470Precision 3480
Precision 3490Precision 5470Precision 5480Precision 5490
Precision 3540Precision 3541Precision 3550Precision 3551
Precision 3560Precision 3561Precision 3570Precision 3571
Precision 3580Precision 3581Precision 3590Mobile Precision 3591
Precision 7540Precision 7550Precision 7560Precision 5680
Mobile Precision 5690Precision 7670Precision 7680Precision 7740
Precision 7750Precision 7760Precision 7770Precision 7780

Dell has been releasing fixed drivers and firmware from March 2025.

Though Cisco Talos researchers pointed out that ControlVault firmware can be automatically deployed via Windows Update, organizations may have trouble deploying them thoroughly across large laptop fleets. (In some organizations, devices may go years without receiving such updates, especially laptops that are used in the field.)

They are also advising disabling the CV services and/or the CV device if users are not using a fingerprint reader, smart card reader and NFC reader, and disabling fingerprint login when leaving one’s laptop unattended.

“Windows also provides Enhanced Sign-in Security (ESS), which may help mitigate some of the physical attacks and detect inappropriate CV firmware,” they added, and noted that some laptop models can detect chassis intrusion (this option can be enabled in the computer’s BIOS).

Endpoint detection tools may be able to flag unauthorized attempts to update firmware, and unexpected crashes of the Windows Biometric Service or the Credential Vault services showing up in Windows logs may point to compromise.

The thing is: systems-on-chip (SOCs) like ControlVault are full computing environments with their own memory, processors, and software, and if attackers can access them and exploit vulnerabilities in them, they represent a new layer of risk.

“These findings highlight the importance of evaluating the security posture of all hardware components within your devices, not just the operating system or software,” the researchers pointed out.

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!



Source link