Archived material. This page is preserved for historical and educational value. It reflects the threat landscape, available guidance, and research context at the time it was written or last updated. It should not be treated as a current security advisory or production remediation guidance. See the Threat Archive index for context and full listing.
Vulnerability · Dell ControlVault3 · 2025

ReVault

Five firmware and Windows API vulnerabilities in Dell ControlVault3 — Dell Security Advisory DSA-2025-053

Summary

ReVault is the codename for a set of five critical vulnerabilities in Dell's ControlVault3 security subsystem, discovered by Cisco Talos and publicly disclosed in late June 2025. The flaws allow attackers to bypass Windows authentication, escalate privileges, and install persistent malware in firmware that can survive OS reinstalls and drive replacements. Affected systems include many Dell Latitude, Precision, and Rugged models. Patches are available via Dell's advisory DSA-2025-053.

Background

ControlVault3 is designed to protect sensitive authentication material (fingerprints, smartcard data, keys) by isolating storage and processing from the host OS. The ReVault vulnerabilities break this isolation boundary.

Impact

What's ControlVault3?

ControlVault3 is Dell's third-generation embedded hardware security module present in many business-class laptops. It:

ReVault exploits flaws in both the firmware and its Windows API layer to break that trust boundary.

Implications

Mitigation

Immediate (0–7 days)

Short-Term (1–4 weeks)

Medium-Term (1–3 months)

Long-Term (3–6+ months)

Timeline

DateEvent
Late 2024 – Jan 2025Cisco Talos discovers vulnerabilities.
January 2025Private disclosure to Dell; triage with Broadcom.
February – March 2025Patch development and testing.
March 2025Initial patches released for select models.
April – May 2025Broader patch availability; advisory prepared.
June 2025Public disclosure; CVEs published.
July 2025 →Elevated exploitation risk on unpatched systems.

Key Takeaways

References

Identification Tool

Use this checklist to determine if a system is affected and up to date:

  1. Identify device model: Settings → System → About. Note Dell model (Latitude/Precision/Rugged).
  2. Check ControlVault3: Device Manager → System devices → look for "Dell ControlVault" / "ControlVault3".
  3. Verify version: Right-click → Properties → Driver tab. Compare against fixed versions in DSA-2025-053:
    • Standard: ≥ 5.15.10.14
    • Plus: ≥ 6.2.26.36
  4. Update if needed: Run SupportAssist or Dell Command | Update.
  5. Reboot and re-check: Confirm versions after update; if still behind, download the package from the system's Dell Support page.

PowerShell Check Script

Helpdesk one-liner to check ControlVault3 version and patch status:

Get-PnpDevice -Class System | Where-Object { $_.FriendlyName -match "ControlVault" } |
ForEach-Object {
    $dev = $_
    $ver = (Get-PnpDeviceProperty -InstanceId $dev.InstanceId -KeyName 'DEVPKEY_Device_DriverVersion').Data
    Write-Host "Device: $($dev.FriendlyName)"
    Write-Host "Driver Version: $ver"
    if ($dev.FriendlyName -match "Plus") {
        if ([version]$ver -ge [version]"6.2.26.36") {
            Write-Host "Status: OK (Patched)" -ForegroundColor Green
        } else {
            Write-Host "Status: Update Needed (Plus version)" -ForegroundColor Red
        }
    } else {
        if ([version]$ver -ge [version]"5.15.10.14") {
            Write-Host "Status: OK (Patched)" -ForegroundColor Green
        } else {
            Write-Host "Status: Update Needed (Standard version)" -ForegroundColor Red
        }
    }
}