Table of Contents
- Is Your Laptop Hiding a Devastating Secret? How to Fix Critical Lenovo and Dell Flaws Today.
- Vulnerabilities in Lenovo UEFI Firmware
- The Danger
- The Solution
- The “ReVault” Flaw in Dell Notebooks
- How to Protect Your Dell Laptop
- Update Firmware
- Disable Unused Services
- Increase Physical Security
- GPUHammer: A Rowhammer Attack on NVIDIA GPUs
- The Solution
Is Your Laptop Hiding a Devastating Secret? How to Fix Critical Lenovo and Dell Flaws Today.
Your computer has hidden software that works before Windows or any other operating system even starts. This software, called firmware or BIOS/UEFI, is essential for your device to function. However, when this core software has a problem, it can create a serious and devastating security risk.
Recently, security researchers found significant vulnerabilities in this low-level firmware for devices made by Lenovo, Dell, and NVIDIA. These flaws can allow an attacker to gain deep control over your computer, making it crucial for you to understand the risks and take action.
Vulnerabilities in Lenovo UEFI Firmware
Some Lenovo computers have security issues in their startup software, which is known as the Insyde BIOS. These problems affect certain Lenovo IdeaCentre and Yoga All-In-One models.
A person with local access to one of these computers could exploit these flaws to either read sensitive information or run their own code in a highly privileged state called System Management Mode (SMM).
The Danger
An attack on this level is particularly dangerous. It could allow a hacker to install a persistent implant or malware that remains hidden from normal security software. Because the malware exists below the operating system, it can survive even if you reinstall Windows or replace the hard drive. These vulnerabilities could even be used to bypass important security features like Secure Boot.
The Solution
Lenovo has released firmware updates to fix these problems. To protect your device, you should visit Lenovo’s official product support website. There, you can search for your specific computer model and download the latest BIOS/UEFI firmware update.
The “ReVault” Flaw in Dell Notebooks
A set of five serious vulnerabilities, collectively named ReVault, was discovered in over 100 different Dell laptop models, including many in the Latitude and Precision lines. The flaws are located in the firmware of a hardware security component called ControlVault3, which is designed to protect sensitive data like passwords and fingerprints.
These vulnerabilities can be used by an attacker in two main ways. First, if a hacker gains user-level access to a laptop, they can exploit the flaw to create a permanent backdoor that persists even after Windows is reinstalled. Second, an attacker with physical access to the device can use the flaw to bypass the Windows login and potentially gain full administrator privileges. This physical attack could work even if the laptop’s disk is encrypted, and could even tamper with the fingerprint reader to accept any fingerprint.
How to Protect Your Dell Laptop
Update Firmware
Dell released firmware updates to fix the ReVault flaws between March and June of 2025. You should install these updates immediately. They are available on the Dell support website and may also be deployed through Windows Update.
Disable Unused Services
If you do not use security peripherals like the fingerprint reader, smart card reader, or NFC, you can disable the ControlVault device in your system’s Device Manager to eliminate the risk.
Increase Physical Security
When traveling or in a public space, consider disabling fingerprint login to reduce the risk from physical attacks. Windows also offers a feature called Enhanced Sign-in Security (ESS) that can help block some of these attack methods.
GPUHammer: A Rowhammer Attack on NVIDIA GPUs
Researchers have developed an attack called GPUHammer, which is a new version of a well-known exploit called Rowhammer. This attack affects the memory in modern graphics cards, specifically NVIDIA GPUs that use GDDR6 memory, such as the NVIDIA A6000. The attack works by rapidly accessing memory locations, which can cause electrical interference that flips bits—changing 0s to 1s—in adjacent memory cells.
The consequences of this attack are most worrying for tasks that rely on high precision, like scientific computing and artificial intelligence. Researchers demonstrated that the GPUHammer attack could degrade the accuracy of an AI model from 80% to less than 1% with just a single bit flip.
The Solution
NVIDIA has stated that the best way to protect against this attack is to enable a feature called Error Correction Code (ECC) at the system level. ECC is a type of memory that can detect and correct single-bit errors on the fly. It is available on many of NVIDIA’s data center, workstation, and professional GPUs. If you use an NVIDIA GPU for critical workloads, you should ensure that ECC is activated to maintain data integrity and protect against this dangerous attack.