ReVault vulnerability in Dell Control Vault firmware disclosed
Summary
Hide β²
Show βΌ
A critical security flaw, dubbed ReVault, has been discovered in the Control Vault firmware used in millions of Dell Latitude and Precision laptops. This vulnerability allows unauthorized access to secure peripherals, such as fingerprint and smart card readers, potentially enabling attackers to extract secret keys and bypass authentication mechanisms. The flaw affects the control board managing secure peripherals, allowing any user on the machine to send undocumented commands. This can lead to code execution, extraction of secret keys, and permanent modification of the firmware, persisting even after reinstalling the operating system. The ReVault vulnerability consists of five CVEs, three of which were combined to achieve code execution and firmware modification. Dell and Broadcom have released patches to address the vulnerability, emphasizing the importance of firmware security and thorough analysis of embedded systems.
Timeline
-
19.08.2025 23:54 π° 2 articles
ReVault vulnerability in Dell Control Vault firmware disclosed
A critical security flaw in the Control Vault firmware of Dell Latitude and Precision laptops has been discovered. This vulnerability allows unauthorized access to secure peripherals, enabling attackers to extract secret keys and bypass authentication mechanisms. The flaw affects the control board managing secure peripherals, allowing any user on the machine to send undocumented commands. This can lead to code execution, extraction of secret keys, and permanent modification of the firmware, persisting even after reinstalling the operating system. The ReVault vulnerability consists of five CVEs, three of which were combined to achieve code execution and firmware modification. Patches have been released to mitigate the issue, highlighting the importance of firmware security and thorough analysis of embedded systems.
Show sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
Information Snippets
-
The ReVault vulnerability affects the Control Vault firmware in Dell Latitude and Precision laptops.
First reported: 19.08.2025 23:54π° 1 source, 2 articlesShow sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
-
The flaw allows unauthorized access to secure peripherals, including fingerprint and smart card readers.
First reported: 19.08.2025 23:54π° 1 source, 2 articlesShow sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
-
Attackers can exploit the vulnerability to gain code execution, extract secret keys, and modify firmware permanently.
First reported: 19.08.2025 23:54π° 1 source, 2 articlesShow sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
-
Dell and Broadcom have released patches to mitigate the vulnerability.
First reported: 19.08.2025 23:54π° 1 source, 2 articlesShow sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
-
The vulnerability highlights the challenges of firmware security and the need for thorough analysis of embedded systems.
First reported: 19.08.2025 23:54π° 1 source, 2 articlesShow sources
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses β www.darkreading.com β 19.08.2025 23:54
- ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination β www.darkreading.com β 22.08.2025 23:21
Similar Happenings
HybridPetya Ransomware Bypasses UEFI Secure Boot via CVE-2024-7344
A new ransomware strain, HybridPetya, has been discovered. It resembles the Petya/NotPetya malware and can bypass UEFI Secure Boot using the CVE-2024-7344 vulnerability. HybridPetya encrypts the Master File Table (MFT) on NTFS-formatted partitions and installs a malicious EFI application on the EFI System Partition. The ransomware has two main components: a bootkit and an installer. The bootkit handles encryption and decryption processes, displaying fake CHKDSK messages to deceive victims. The ransom note demands $1,000 in Bitcoin, with a wallet receiving $183.32 between February and May 2025. HybridPetya exploits a remote code execution vulnerability in the Howyar Reloader UEFI application, allowing it to bypass Secure Boot. The variant uses a specially crafted file named 'cloak.dat' to load the bootkit binary. Microsoft revoked the vulnerable binary in January 2025. ESET's telemetry data indicates no evidence of HybridPetya being used in the wild, suggesting it may be a proof-of-concept (PoC). The ransomware incorporates characteristics from both Petya and NotPetya, including the visual style and attack chain. It drops several files into the EFI System Partition, including configuration, validation, and encryption progress tracking files. The ransom note provides a 32-character key for decryption and system restoration upon payment. Indicators of compromise for HybridPetya are available on a GitHub repository. Microsoft fixed CVE-2024-7344 with the January 2025 Patch Tuesday updates.
CVE-2025-5086 in DELMIA Apriso Exploited in the Wild
A critical deserialization vulnerability (CVE-2025-5086) in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software is being actively exploited. The flaw, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. The vulnerability allows for remote code execution, and exploitation attempts have been observed originating from an IP address in Mexico. The attacks involve sending a malicious HTTP request with a Base64-encoded payload. The payload decodes to a Windows executable identified as "Trojan.MSIL.Zapchast.gen," a spyware capable of capturing user activities and sending collected information to attackers. DELMIA Apriso is used in production processes for digitalizing and monitoring, including scheduling production, quality management, resource allocation, warehouse management, and integration between production equipment and business applications. The flaw impacts critical industries such as automotive, aerospace, electronics, high-tech, and industrial machinery. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to the Known Exploited Vulnerabilities (KEV) catalog and is advising federal agencies to apply necessary updates by October 2, 2025.
Remote Code Execution Vulnerability in Samsung's libimagecodec.quram.so Library Exploited in the Wild
A remote code execution vulnerability in Samsung's libimagecodec.quram.so library, tracked as CVE-2025-21043, was actively exploited in zero-day attacks targeting Samsung Android devices running Android 13, 14, 15, or 16. The flaw, reported by Meta and WhatsApp, allows attackers to execute arbitrary code remotely due to an out-of-bounds write weakness. The CVSS score for the vulnerability is 8.8. Samsung has released a patch for the vulnerability in the September 2025 Security Maintenance Release (SMR). The exploit may affect other instant messengers using the vulnerable library. Users are advised to update their devices to the latest security patch.
Akira Ransomware Exploits SonicWall SSL VPN Flaws and Misconfigurations
The Akira ransomware group has been actively exploiting vulnerabilities and misconfigurations in SonicWall SSL VPN devices to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting organizations globally, including those in Australia. The attacks leverage a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings to bypass access controls and facilitate ransomware deployment. The threat actors use a combination of brute-forcing credentials, exploiting default configurations, and leveraging the Virtual Office Portal to configure multi-factor authentication (MFA) with valid accounts. These tactics allow them to bypass security measures and gain unauthorized access to networks. SonicWall has confirmed that recent SSLVPN activity is related to CVE-2024-40766, not a zero-day vulnerability. The affected firewall versions include specific models of Gen 5, Gen 6, and Gen 7 devices. Organizations are advised to update to firmware version 7.3.0 or later, rotate passwords, enforce MFA, mitigate the SSLVPN Default Groups risk, and restrict Virtual Office Portal access to trusted/internal networks to mitigate risks.
Critical SessionReaper vulnerability patched in Adobe Commerce and Magento Open Source
Adobe has patched a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms, dubbed SessionReaper. This flaw, with a CVSS score of 9.1, could allow unauthenticated attackers to take control of customer accounts via the Commerce REST API. The patch was released on September 9, 2025, following an emergency notification to selected customers on September 4, 2025. Adobe Commerce on Cloud customers were already protected by a WAF rule deployed as an interim measure. The vulnerability is considered one of the most severe in the platform's history, with potential for widespread exploitation. Administrators are advised to apply the patch immediately, as it disables certain internal Magento functionalities that may affect custom or external code. The affected versions include Adobe Commerce 2.4.9-alpha2 and earlier, 2.4.8-p2 and earlier, 2.4.7-p7 and earlier, 2.4.6-p12 and earlier, 2.4.5-p14 and earlier, and 2.4.4-p15 and earlier. The affected versions also include Adobe Commerce B2B 1.5.3-alpha2 and earlier, 1.5.2-p2 and earlier, 1.4.2-p7 and earlier, 1.3.4-p14 and earlier, and 1.3.3-p15 and earlier. The affected versions include Magento Open Source 2.4.9-alpha2 and earlier, 2.4.8-p2 and earlier, 2.4.7-p7 and earlier, 2.4.6-p12 and earlier, and 2.4.5-p14 and earlier. The Custom Attributes Serializable module versions 0.1.0 to 0.4.0 are also affected.