- Critical security vulnerabilities have been identified in Broadcom chips
- These defects leave the Dell devices containing the chips at risk
- The resulting attack has been called ‘Revault’, and users should patch now
A large amount of critical safety failures in Broadcom chips could mean dozens of millions of laptops Dell and other devices run the risk of possible attacks.
The serious vulnerabilities have been found in more than 100 models of Dell laptops with Broadcom chips, Cisco Talos has revealed and, therefore, run the risk of an attack that the researchers called ‘Revault’.
A Revault attack could be used ‘as a physical commitment to avoid the login of Windows and/or for any local user to obtain administration/system privileges’, allowing a hacker to steal information and confidential credentials, as well as biometric data such as digital fingerprint information.
Dell laptops at risk
These defects could have a “significant” impact on the victims, and Cisco Talos reports two main attack scenarios; A physical attack and a pivot after the commitment.
As the name implies, the physical attack refers to a local attacker with access to the victim’s device that obtains direct access to the USB USB plate with a personalized connector.
From there, vulnerabilities become ‘in the scope of the attacker without requiring the ability to log in to the system or know a full -album encryption password’. If a system is configured to unlock with biometric data, it could be possible to adjust the CV firmware to allow a digital footprint instead of only legitimate users.
In a pivot after the commitment, users without administrative privileges can use the CV firmware to activate the execution of the arbitrary code and potentially filter the essential key material for the safety of the device “and then obtain the ability to modify the firmware permanently.
Dell confirmed that customers have been notified about the available updates addressing vulnerabilities; “Working with our firmware provider, we address the problems quickly and transparently the informed vulnerabilities according to our vulnerability response policy.”
“Customers can review the Dell Security Advisory DSA-2025-053 to obtain information on affected products, versions and more. As always, it is important that customers immediately apply security updates that we make available and move to compatible versions of our products to ensure that their systems remain safe.”
It is not yet clear if these vulnerabilities have been exploited in nature, but of course, users are advised to urgently patch them to address them, as well as to regularly rotate passwords and use MFA when possible.