Scam Alert: If you have this laptop, be careful! Hackers can steal all your information..

Cybersecurity experts have discovered extremely dangerous vulnerabilities in some of Dell's popular business laptops, which can be exploited by hackers to log in without a password, gain administrator access, and even retain control over the system even after reinstalling the operating system. This vulnerability set is named ReVault, and it affects ControlVault3 and ControlVault3+ firmware.
ControlVault is a hardware security module that safely stores sensitive information such as passwords, fingerprint data, and security codes. This module is used in Dell's Latitude, Precision, and Rugged series, which are widely used by government institutions and large companies.
More than 100 Dell laptop models are affected by this bug, the major ones being:
Latitude Series
5440, 5500, 5520, 5530, 5540, 5550, 7030 Rugged Extreme, 7200 2-in-1, 7330, 7400, 7430, 7450, 7520, 7640, 9330, 9410, 9440 2-in-1, 9450, 9510 2-in-1, 9520, Rugged 7220EX, etc.
Precision Series
3470, 3550, 3560, 3570, 3580, 3590, 5470, 5490, 7540, 7560, 7670, etc. If your Dell laptop is in the Business Series, then it is important to check for updates immediately.
How the attack happens
A non-admin user can also insert malicious code into ControlVault via the Windows API. This code can remain active even after the OS is reinstalled. If someone gets physical access to your laptop, he can bypass authentication by directly plugging in the USH board. Even the fingerprint sensor can be forced to recognize any finger.
Preventive measures
Update firmware immediately
ControlVault3: Version 5.15.10.14 or above
ControlVault3+: Version 6.2.26.36 or above
Install updates from Windows Update or the Dell support website
Disable unused security features
If you don't use fingerprint, smart cards, or NFC, turn them off in Windows Service Manager or Device Manager.
Avoid biometrics in risky locations
When traveling, turn off fingerprint login and use a strong password or PIN with Windows Enhanced Sign-In Security (ESS).
Turn on Chassis Intrusion Detection
Turn on this feature in the BIOS to quickly report any tampering.
If the biometric or credential service crashes repeatedly, run a security scan immediately.
Disclaimer: This content has been sourced and edited from TV9. While we have made modifications for clarity and presentation, the original content belongs to its respective authors and website. We do not claim ownership of the content.