ReVault: When Dell’s Built-In Security Becomes a Backdoor

Keys are under the mat.
David Eberly
Contributing Writer
Glowing door

Security researchers at Cisco Talos have revealed a set of five critical vulnerabilities in Dell’s ControlVault3 firmware and its associated Windows APIs. Dubbed ReVault”, the flaws affect over 100 models of widely used Dell Latitude and Precision laptops.

ControlVault, a dedicated security chip, is designed to safeguard sensitive biometric data, passwords, and encryption keys. However, these new vulnerabilities expose how this secure enclave can be compromised.

ReVault vulnerabilities range from unsafe deserialization to memory manipulation bugs, enabling attackers to gain access to compromised systems, even after operating system reinstalls. In physical attacks, threat actors can bypass login mechanisms or plant malicious firmware undetectable by antivirus software.

Despite available patches, many systems remain unprotected, emphasizing the need for urgent mitigation.

Why It Matters: ControlVault is a core security feature for many Dell laptops in high-trust environments. A breach at the firmware level undermines advanced authentication measures, rendering systems vulnerable. These findings highlight the critical importance of securing hardware firmware often overlooked in standard security protocols.

  • Five CVEs Uncover Firmware and API Weaknesses Cisco Talos identified five vulnerabilities in Dell’s ControlVault3 and associated APIs:
    • CVE-2025-24919 (unsafe deserialization),
    • CVE-2025-24311 (out-of-bounds read),
    • CVE-2025-25050 (out-of-bounds write),
    • CVE-2025-24922 (stack buffer overflow),
    • CVE-2025-25215 (arbitrary memory free).
  • Post-Compromise Persistence and Firmware Implantation: Even without admin privileges, users can interact with the ControlVault firmware through its Windows APIs. This loophole gives attackers the chance to insert persistent malware that can survive even if Windows is completely reinstalled. It’s a serious threat to anyone dealing with post-compromise scenarios.
  • Hands-On Hack Can Bypass Fingerprints and Logins: If someone has physical access to a vulnerable laptop, they can tap directly into the Unified Security Hub using a custom USB connector. From there, they can tamper with the firmware, override biometric checks like fingerprints, and bypass login protections without authentication.
  • Patches Are Out—But Many Devices May Still Be Unprotected: Dell began rolling out updates in March 2025 and notified users in June. However, complexities surrounding firmware updates, especially in large organizations, leave the potential for many vulnerable devices.
  • Recommended Mitigation Steps Include Firmware Updates and Disabling CV: Talos urges users to update their firmware via Dell’s support page or Windows Update. Cisco Talos recommends checking for the latest firmware updates via Dell’s support site or Windows Update. Organizations without security features like fingerprint or smart card login should consider disabling ControlVault services through Windows settings. Enabling chassis intrusion detection in BIOS and watching for unusual activity in Windows logs can also help spot signs of tampering.

Go Deeper -> ReVault! When your SoC turns against you… – Talos

‘Critical’ firmware-level vulnerabilities found in laptops commonly used by security specialists – The Record

Trusted insights for technology leaders

Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.

Subscribe to our 4x a week newsletter to keep up with the insights that matter.

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of the CIO Professional Network.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Name
Newsletters