Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
References
Link | Resource |
---|---|
https://uefi.org/revocationlistfile | Patch |
https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html | Related |
https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html | Related |
https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ | Related |
https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Jan 2025, 15:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ - Exploit, Mitigation, Third Party Advisory |
21 Jan 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource |
21 Jan 2025, 17:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* | |
First Time |
Radix smart Recovery
|
21 Jan 2025, 16:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* | |
First Time |
Cs-grp
Cs-grp neo Impact |
21 Jan 2025, 16:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Radix smartrecovery
Signalcomputer Ces neoimpact Ces Greenware Sanfong Wasay erecoveryrx Wasay Signalcomputer hdd King Sanfong ez-back System Howyar Radix Greenware greenguard Howyar sysreturn |
|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
CWE | CWE-347 | |
References | () https://uefi.org/revocationlistfile - Patch | |
References | () https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html - Related | |
References | () https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - Related | |
References | () https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ - Related | |
References | () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* |
14 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
14 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 14:15
Updated : 2025-01-22 15:41
NVD link : CVE-2024-7344
Mitre link : CVE-2024-7344
CVE.ORG link : CVE-2024-7344
JSON object : View
Products Affected
signalcomputer
- hdd_king
cs-grp
- neo_impact
sanfong
- ez-back_system
radix
- smart_recovery
howyar
- sysreturn
greenware
- greenguard
wasay
- erecoveryrx
CWE
CWE-347
Improper Verification of Cryptographic Signature