You might be using a hacked Dell laptop right now, and wiping Windows won't save you

Affecting 100+ Latitude and Precision models, this exploit slips right past antivirus protection.

0comments
Dell Latitude 5450 laptop on a black background.
Dell Latitude 5450. | Image by Dell

Security in the digital age is no joke and when a major breach hits, things get serious fast. Now, a wide range of newishly discovered vulnerabilities is putting millions of Dell laptops at risk – and if you are using one, especially in business or government settings, it's time to act fast.

A new report reveals that more than 100 Dell laptop models, mainly from the Latitude and Precision lines used by enterprises, cybersecurity experts and government agencies, are affected by a set of critical firmware vulnerabilities. These flaws could give attackers persistent access – even if you wipe and reinstall Windows.

The flaws, collectively named "ReVault", affect the Broadcom BCM5820X security chip embedded in Dell's ControlVault3 firmware. This chip is designed to protect passwords, biometric data and encryption keys – but in this case, it could do the opposite, letting attackers steal that info and stay hidden inside your system.


Dell has confirmed the vulnerabilities and rolled out security updates, but if you are in charge of managing a fleet of Dell machines, now is the time to make sure those updates are actually getting installed.

What's ControlVault3 and why does it matter?


Dell's ControlVault is a hardware-based security system – a kind of digital vault – that stores your most sensitive info, like passwords, fingerprints and security codes, outside of your regular OS. It lives on a separate board inside the laptop called the Unified Security Hub (USH) and connects to smart card readers, NFC and fingerprint scanners.

Cisco Talos researchers found five major flaws in ControlVault3 and ControlVault3+ firmware:

  • CVE-2025-24311 – Out-of-bounds read → info leak
  • CVE-2025-25050 – Out-of-bounds write → code execution
  • CVE-2025-25215 – Arbitrary memory free → memory corruption
  • CVE-2025-24922 – Stack-based buffer overflow → code execution
  • CVE-2025-24919 – Unsafe deserialization in Windows APIs

Each of these scored above 8.0 on the CVSS scale, making them high-severity. Combined, they can be used in extremely dangerous ways – including full system compromise.

Would you know if your laptop had a security flaw like this?


The worst part? These flaws can survive a full Windows reinstall.

Because the vulnerabilities sit below the OS in the firmware layer, they can give attackers persistent access – and antivirus software won't catch it. The research team showed how even non-admin users can trigger these flaws through Windows APIs, potentially stealing cryptographic keys and modifying the firmware itself.

And even without remote access, an attacker with just a few minutes of physical access could open the laptop and connect directly to the USH board via USB, bypassing system login and even full-disk encryption.

Recommended Stories
And yeah, it gets wild – the researchers showed how they could trick a compromised ControlVault chip to accept any fingerprint, including objects like vegetables, as valid biometric input.

What should users and admins do?


First, update now. Dell has been releasing firmware patches and drivers since March 2025 and in many cases, they are being pushed through Windows Update.

The researchers also recommend:

  • Disabling ControlVault services/devices if you are not using fingerprint, smart card, or NFC readers.
  • Turning off biometric login when leaving your laptop unattended.
  • Using Enhanced Sign-In Security (ESS) in Windows for extra protection against physical tampering.
  • Enabling chassis intrusion detection in BIOS, if available.

Also, endpoint detection tools could help flag suspicious firmware access attempts, and unexplained crashes in Windows Biometric or Credential Vault services could be signs something's wrong.

Why this matters more than ever


Firmware components like ControlVault are full computing systems on their own – they've got memory, processors and software. And that means attackers exploiting them can sidestep traditional OS-level protections completely.

– Cisco Talos researchers, August, 2025

Bottom line: firmware vulnerabilities like ReVault are dangerous, sneaky, and easy to overlook. If you are running a Dell business laptop, this isn't one to ignore.
Loading Comments...

Latest Discussions

Recommended Stories

FCC OKs Cingular\'s purchase of AT&T Wireless