Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
References
| Link | Resource |
|---|---|
| https://uefi.org/revocationlistfile | Patch |
| https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html | Related |
| https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html | Related |
| https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ | Related |
| https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
| https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
| https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-01-14 14:15
Updated : 2025-01-22 15:41
NVD link : CVE-2024-7344
Mitre link : CVE-2024-7344
CVE.ORG link : CVE-2024-7344
JSON object : View
Products Affected
sanfong
- ez-back_system
greenware
- greenguard
cs-grp
- neo_impact
signalcomputer
- hdd_king
howyar
- sysreturn
radix
- smart_recovery
wasay
- erecoveryrx
CWE
CWE-347
Improper Verification of Cryptographic Signature
