CVE-2024-7344

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:*
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:*
cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:*
cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:*
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:*
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:*
cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:*

History

22 Jan 2025, 15:41

Type Values Removed Values Added
References () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ - () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ - Exploit, Mitigation, Third Party Advisory

21 Jan 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ -
References () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource

21 Jan 2025, 17:09

Type Values Removed Values Added
CPE cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:*
First Time Radix smart Recovery

21 Jan 2025, 16:50

Type Values Removed Values Added
CPE cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:*
First Time Cs-grp
Cs-grp neo Impact

21 Jan 2025, 16:31

Type Values Removed Values Added
First Time Radix smartrecovery
Signalcomputer
Ces neoimpact
Ces
Greenware
Sanfong
Wasay erecoveryrx
Wasay
Signalcomputer hdd King
Sanfong ez-back System
Howyar
Radix
Greenware greenguard
Howyar sysreturn
Summary
  • (es) La aplicación Howyar UEFI Application "Reloader" (32 bits y 64 bits) es vulnerable a la ejecución de software no firmado en una ruta codificada.
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.2
CWE CWE-347
References () https://uefi.org/revocationlistfile - () https://uefi.org/revocationlistfile - Patch
References () https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html - () https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html - Related
References () https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - () https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - Related
References () https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ - () https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ - Related
References () https://www.kb.cert.org/vuls/id/529659 - () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource
CPE cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:*
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:*
cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:*
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:*
cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:*
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:*
cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:*

14 Jan 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

14 Jan 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/529659 -

14 Jan 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-14 14:15

Updated : 2025-01-22 15:41


NVD link : CVE-2024-7344

Mitre link : CVE-2024-7344

CVE.ORG link : CVE-2024-7344


JSON object : View

Products Affected

signalcomputer

  • hdd_king

cs-grp

  • neo_impact

sanfong

  • ez-back_system

radix

  • smart_recovery

howyar

  • sysreturn

greenware

  • greenguard

wasay

  • erecoveryrx
CWE
CWE-347

Improper Verification of Cryptographic Signature