From the Bleeping Computer Article:
ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that persists across system reinstalls. Dell ControlVault is a hardware-based security solution that stores passwords, biometric data, and security codes within firmware on a dedicated daughterboard, known as the Unified Security Hub (USH). The five vulnerabilities, reported by Cisco’s Talos security division and dubbed “ReVault,” affect both the ControlVault3 firmware and its Windows application programming interfaces (APIs) across Dell’s business-focused Latitude and Precision laptop series. These devices are popular in cybersecurity, government, and industrial environments, where smartcards, fingerprints, and NFC are also commonly used for authentication.
What does this mean? A remote attacker, if they can get onto the machine, can then use these vulnerabilities to install something called a rootkit…this malware can stay on that board and will survive a system wipe. The only way to remove it is to reflash the firmware or replace the machine, depending on how deeply embedded the malware is. Even advanced anti-malware might miss this type of attack. Unless you have someone watching for this type of attack and then able to keep your machine updated, this type of threat is active.
This is where FreedomIT comes into play. With FreedomIT, ETC Maryland actively monitors for active security threats and would keep your equipment updated as quickly as possible. With FreedomIT’s flexible monthly terms, you do not have to get locked into a long term contract while not worrying about how much will this cost me? Provided enough hours are purchased, there would be no additional charge for the updates. Contact us to see how FreedomIT can help manage your technology.