Black Hat
,
Endpoint Security
,
Events
Philippe Laulheret of Cisco Talos on Vulnerabilities in ControlVault Firmware
Security flaws in Dell’s ControlVault firmware allowed attackers to run code on the chip, extract stored secrets and alter its behavior. By chaining these exploits, hackers could send malicious data to Windows components, achieve system-level access and bypass fingerprint authentication, said Philippe Laulheret, senior vulnerability researcher at Cisco Talos.
See Also: What Manufacturing Leaders Are Learning About Cloud Security – from Google’s Frontline
Laulheret said the firmware lacked modern protections such as address space layout randomization, or ASLR, and stack cookies, making exploitation easier. Legacy and unused code widened the attack surface.
“These chips … their job is to improve your security posture, but they can also bring a new attack surface that you may have to mitigate against,” Laulheret said. “What they [enterprises] can do is try to understand the secret exposure of the devices they get into the system.”
In this video interview with Information Security Media Group at Black Hat USA 2025, Laulheret also discussed:
- The methodology for obtaining, decrypting and reversing firmware to find flaws;
- The role of Windows drivers and user-level APIs in interacting with the chip;
- Why transparency and regular code review are essential for embedded device security.
Laulheret has nearly a decade of experience in security, static analysis, reverse engineering and vulnerability research. He applies his expertise in embedded security and software engineering to analyze and manipulate complex systems. He has presented his research work on hardware hacking, reverse engineering and exploitation at prominent security conferences, including DEF CON, Hardwear.io, Ekoparty and Hexacon.