Cisco Talos Blog: ReVault! When your SoC turns against you…

Source URL: https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you/
Source: Cisco Talos Blog
Title: ReVault! When your SoC turns against you…

Feedly Summary: Talos reported 5 vulnerabilities to Broadcom and Dell affecting both the ControlVault3 Firmware and its associated Windows APIs that we are calling “ReVault”. 

AI Summary and Description: Yes

**Summary:**
The report details significant vulnerabilities discovered in Dell’s ControlVault3 Firmware and its associated Windows APIs, which can be exploited for unauthorized persistence, privilege escalation, and firmware compromise. These vulnerabilities affect over 100 Dell laptop models, particularly in sensitive environments where security is paramount, emphasizing the need for ongoing vigilance and timely patching.

**Detailed Description:**
The vulnerabilities reported by Talos highlight a critical security issue within Dell’s ControlVault3 Firmware, which is integral to the secure storage of sensitive information such as passwords and biometric data. Here are the key points from the findings:

– **Vulnerability Overview:**
– Talos identified five vulnerabilities (CVEs) in the ControlVault firmware, including:
– Multiple out-of-bounds vulnerabilities (CVE-2025-24311, CVE-2025-25050)
– Arbitrary free vulnerability (CVE-2025-25215)
– Stack overflow vulnerability (CVE-2025-24922)
– Unsafe deserialization issue (CVE-2025-24919) affecting ControlVault’s Windows APIs

– **Affected Devices:**
– Over 100 models of Dell laptops, particularly from the Latitude and Precision series, are affected by these vulnerabilities, making them relevant in high-security contexts such as government and cybersecurity operations.

– **Potential Attack Scenarios:**
– **Post-Compromise Persistence:**
– Non-administrative users exploiting CV firmware can initiate arbitrary code execution, allowing attackers to leak essential keys for device security and modify firmware for stealthy persistence.
– **Physical Compromise:**
– Attackers with physical access can manipulate the USH board via USB, circumventing login requirements and gaining unauthorized control over security measures like biometric logins.

– **Mitigation Recommendations:**
– Keeping firmware updated and utilizing Windows Update for timely patches.
– Disabling ControlVault services if not in use and considering disabling fingerprint login during high-risk situations.
– Enable chassis intrusion detection and monitor Windows logs for signs of compromise.

– **Detection Strategies:**
– Utilize BIOS settings for chassis intrusion alerts and watch for abnormal processes that might indicate exploitation of affected firmware.

– **Conclusion and Importance:**
– The alert underscores the critical need for security professionals to assess firmware, as vulnerabilities in hardware components like Dell’s ControlVault can undermine even robust software defenses. Patching, continual assessment of risks, and heightened awareness are essential measures to defend against evolving threats in cybersecurity.

This situation clearly illustrates the intersection of hardware and software security, necessitating a comprehensive approach in evaluating overall system integrity.