8.2
HIGH
CVE-2024-7344
Howyar UEFI "Code Execution in Untrusted Path" Vulnerability
Description

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

INFO

Published Date :

Jan. 14, 2025, 2:15 p.m.

Last Modified :

Jan. 22, 2025, 3:41 p.m.

Remotely Exploitable :

No

Impact Score :

6.0

Exploitability Score :

1.5
Affected Products

The following products are affected by CVE-2024-7344 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Radix smartrecovery
2 Radix smart_recovery
1 Ces neoimpact
1 Greenware greenguard
1 Howyar sysreturn
1 Sanfong ez-back_system
1 Signalcomputer hdd_king
1 Wasay erecoveryrx
1 Cs-grp neo_impact
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-7344.

URL Resource
https://uefi.org/revocationlistfile Patch
https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html Related
https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html Related
https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ Related
https://www.kb.cert.org/vuls/id/529659 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/529659 Third Party Advisory US Government Resource
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ Exploit Mitigation Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-7344 vulnerability anywhere in the article.

  • tripwire.com
Tripwire Patch Priority Index for January 2025

Tripwire's January 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.First on the list are patches for the Microsoft office platform, including Word, Access, Visi ... Read more

Published Date: Feb 04, 2025 (2 weeks, 3 days ago)
  • TheCyberThrone
CVE-2024-53691: PoC Exploit Code Release for QNAP Flaw

CVE-2024-53691 is a severe remote code execution (RCE) vulnerability discovered in QNAP NAS devices. Recently, security researcher c411e released a Proof-of-Concept (PoC) exploit code, underscoring th ... Read more

Published Date: Jan 20, 2025 (1 month ago)
  • Help Net Security
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger is e ... Read more

Published Date: Jan 19, 2025 (1 month ago)
  • TheCyberThrone
CVE-2025-0107 PoC Exploit Code Released for PaloAlto Flaw

Background:CVE-2025-0107 is a critical OS command injection vulnerability discovered in Palo Alto Networks’ Expedition Tool, version 1.2.101 and earlier. Recently, security researchers released a Proo ... Read more

Published Date: Jan 19, 2025 (1 month ago)
  • TheCyberThrone
CVE-2024-7344 impacts UEFI based systems

CVE-2024-7344 is a critical vulnerability affecting UEFI-based systems. It was discovered by researchers at ESET and involves a bypass of the UEFI Secure Boot mechanism, allowing untrusted code to run ... Read more

Published Date: Jan 18, 2025 (1 month ago)
  • BleepingComputer
New UEFI Secure Boot flaw exposes systems to bootkits, patch now

A new UEFI Secure Boot bypass vulnerability tracked as CVE-2024-7344 that affects a Microsoft-signed application could be exploited to deploy bootkits even if Secure Boot protection is active. The vul ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • Help Net Security
Critical SimpleHelp vulnerabilities fixed, update your server instances!

If you’re an organization using SimpleHelp for your remote IT support/access needs, you should update or patch your server installation without delay, to fix security vulnerabilities that may be explo ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • Ars Technica
Microsoft patches Windows to eliminate Secure Boot bypass threat

For the past seven months—and likely longer—an industry-wide standard that protects Windows devices from firmware infections could be bypassed using a simple technique. On Tuesday, Microsoft finally p ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • The Hacker News
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

Vulnerability / Cybersecurity Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) sys ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • security.nl
Bootloader-beveiligingslek laat aanvallers UEFI Secure Boot omzeilen

Een kwetsbaarheid in een bootloader-applicatie maakt het mogelijk voor aanvallers om UEFI Secure Boot te omzeilen en zo het systeem te compromitteren. Het probleem is inmiddels door de betrokken lever ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • Dark Reading
Trusted Apps Sneak a Bug Into the UEFI Boot Process

Source: Ognyan Yosifov via Alamy Stock PhotoA vulnerability in trusted system recovery programs could allow privileged attackers to inject malware directly into the system startup process in Unified E ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • Help Net Security
New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)

ESET researchers have identified a vulnerability (CVE-2024-7344) impacting most UEFI-based systems, which allows attackers to bypass UEFI Secure Boot. The issue was found in a UEFI application signed ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • Cybersecurity News
13,000 MikroTik Routers Hijacked for Global Malspam Operation

A recent report from Infoblox Threat Intel highlights a sophisticated botnet operation leveraging a simple DNS misconfiguration to distribute malware on a massive scale. This botnet, built on approxim ... Read more

Published Date: Jan 16, 2025 (1 month ago)
  • The Hacker News
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks. O ... Read more

Published Date: Jan 15, 2025 (1 month ago)
  • tripwire.com
VERT Threat Alert: January 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In ... Read more

Published Date: Jan 14, 2025 (1 month ago)
  • BleepingComputer
Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws

Today is Microsoft's January 2025 Patch Tuesday, which includes security updates for 159 flaws, including eight zero-day vulnerabilities, with three actively exploited in attacks.This Patch Tuesday al ... Read more

Published Date: Jan 14, 2025 (1 month ago)

The following table lists the changes that have been made to the CVE-2024-7344 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Jan. 22, 2025

    Action Type Old Value New Value
    Changed Reference Type https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ No Types Assigned https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ Exploit, Mitigation, Third Party Advisory
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jan. 21, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
    Removed CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
    Added Reference https://www.kb.cert.org/vuls/id/529659
    Added Reference https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
  • Reanalysis by [email protected]

    Jan. 21, 2025

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127
  • Reanalysis by [email protected]

    Jan. 21, 2025

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127
  • Initial Analysis by [email protected]

    Jan. 21, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
    Added CWE NIST CWE-347
    Added CPE Configuration OR *cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127
    Changed Reference Type https://uefi.org/revocationlistfile No Types Assigned https://uefi.org/revocationlistfile Patch
    Changed Reference Type https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html No Types Assigned https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html Related
    Changed Reference Type https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html No Types Assigned https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html Related
    Changed Reference Type https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ No Types Assigned https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ Related
    Changed Reference Type https://www.kb.cert.org/vuls/id/529659 No Types Assigned https://www.kb.cert.org/vuls/id/529659 Third Party Advisory, US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jan. 14, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Jan. 14, 2025

    Action Type Old Value New Value
    Added Reference https://www.kb.cert.org/vuls/id/529659
  • New CVE Received by [email protected]

    Jan. 14, 2025

    Action Type Old Value New Value
    Added Description Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
    Added Reference https://uefi.org/revocationlistfile
    Added Reference https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html
    Added Reference https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html
    Added Reference https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-7344 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-7344 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability