CVE-2024-7344

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:*
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:*
cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:*
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:*
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:*
cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:*
cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:*

History

22 Jan 2025, 15:41

Type Values Removed Values Added
References () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ - () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ - Exploit, Mitigation, Third Party Advisory

21 Jan 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ -

21 Jan 2025, 17:09

Type Values Removed Values Added
First Time Radix smart Recovery
CPE cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:*

21 Jan 2025, 16:50

Type Values Removed Values Added
First Time Cs-grp neo Impact
Greenware greenguard
Radix
Wasay
Greenware
Sanfong
Signalcomputer hdd King
Cs-grp
Howyar
Signalcomputer
Wasay erecoveryrx
Radix smartrecovery
Sanfong ez-back System
Howyar sysreturn
CWE CWE-347
References () https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - () https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - Related
References () https://uefi.org/revocationlistfile - () https://uefi.org/revocationlistfile - Patch
References () https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ - () https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ - Related
References () https://www.kb.cert.org/vuls/id/529659 - () https://www.kb.cert.org/vuls/id/529659 - Third Party Advisory, US Government Resource
References () https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html - () https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html - Related
CPE cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:*
cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:*
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:*
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:*
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:*
cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:*
cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2

14 Jan 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/529659 -

14 Jan 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-14 14:15

Updated : 2025-01-22 15:41


NVD link : CVE-2024-7344

Mitre link : CVE-2024-7344


JSON object : View

Products Affected

greenware

  • greenguard

wasay

  • erecoveryrx

howyar

  • sysreturn

sanfong

  • ez-back_system

cs-grp

  • neo_impact

signalcomputer

  • hdd_king

radix

  • smart_recovery
CWE
CWE-347

Improper Verification of Cryptographic Signature