Dell has released patches addressing five high-severity firmware vulnerabilities affecting over 100 laptop models equipped with ControlVault3 chips. These vulnerabilities, collectively referred to as the "ReVault" flaws, allow attackers to bypass Windows login, steal cryptographic keys, and persist on devices even after a full operating system reinstall, sometimes without requiring the user's password. Security researchers have highlighted the critical nature of these flaws, which impact millions of devices worldwide. Users of the affected Dell laptops are strongly advised to install the updated firmware to mitigate these risks. Concurrently, Microsoft has issued advisories regarding a high-severity privilege escalation flaw in on-premises Exchange Server that could affect connected Exchange cloud environments. Additionally, new vulnerabilities have been identified that enable attackers to exploit Windows RPC and LDAP protocols to convert public domain controllers into DDoS botnets.
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP: https://t.co/kldrMmrPYD by The Hacker News #infosec #cybersecurity #technology #news
.@Microsoft advised customers to fix a high-severity on-premises Exchange Server flaw that could potentially escalate privileges within an organization’s connected Exchange cloud environment. #cybersecurity #infosec #ITsecurity https://t.co/P0O7a7GIC3
.@Dell patched a series of five high-severity firmware vulnerabilities affecting more than 100 laptop models. Users of the affected devices must install the updated firmware to remediate the vulnerabilities. #cybersecurity #infosec #ITsecurity https://t.co/FfKMIBxGs3