CVE-2024-7344
Howyar UEFI "Code Execution in Untrusted Path" Vulnerability
Description
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
INFO
Published Date :
Jan. 14, 2025, 2:15 p.m.
Last Modified :
Jan. 22, 2025, 3:41 p.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
6.0
Exploitability Score :
1.5
Affected Products
The following products are affected by CVE-2024-7344
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-7344
.
URL | Resource |
---|---|
https://uefi.org/revocationlistfile | Patch |
https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html | Related |
https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html | Related |
https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ | Related |
https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/529659 | Third Party Advisory US Government Resource |
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ | Exploit Mitigation Third Party Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-7344
vulnerability anywhere in the article.

-
tripwire.com
Tripwire Patch Priority Index for January 2025
Tripwire's January 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.First on the list are patches for the Microsoft office platform, including Word, Access, Visi ... Read more

-
TheCyberThrone
CVE-2024-53691: PoC Exploit Code Release for QNAP Flaw
CVE-2024-53691 is a severe remote code execution (RCE) vulnerability discovered in QNAP NAS devices. Recently, security researcher c411e released a Proof-of-Concept (PoC) exploit code, underscoring th ... Read more

-
Help Net Security
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger is e ... Read more

-
TheCyberThrone
CVE-2025-0107 PoC Exploit Code Released for PaloAlto Flaw
Background:CVE-2025-0107 is a critical OS command injection vulnerability discovered in Palo Alto Networks’ Expedition Tool, version 1.2.101 and earlier. Recently, security researchers released a Proo ... Read more

-
TheCyberThrone
CVE-2024-7344 impacts UEFI based systems
CVE-2024-7344 is a critical vulnerability affecting UEFI-based systems. It was discovered by researchers at ESET and involves a bypass of the UEFI Secure Boot mechanism, allowing untrusted code to run ... Read more

-
BleepingComputer
New UEFI Secure Boot flaw exposes systems to bootkits, patch now
A new UEFI Secure Boot bypass vulnerability tracked as CVE-2024-7344 that affects a Microsoft-signed application could be exploited to deploy bootkits even if Secure Boot protection is active. The vul ... Read more

-
Help Net Security
Critical SimpleHelp vulnerabilities fixed, update your server instances!
If you’re an organization using SimpleHelp for your remote IT support/access needs, you should update or patch your server installation without delay, to fix security vulnerabilities that may be explo ... Read more

-
Ars Technica
Microsoft patches Windows to eliminate Secure Boot bypass threat
For the past seven months—and likely longer—an industry-wide standard that protects Windows devices from firmware infections could be bypassed using a simple technique. On Tuesday, Microsoft finally p ... Read more

-
The Hacker News
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Vulnerability / Cybersecurity Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) sys ... Read more

-
security.nl
Bootloader-beveiligingslek laat aanvallers UEFI Secure Boot omzeilen
Een kwetsbaarheid in een bootloader-applicatie maakt het mogelijk voor aanvallers om UEFI Secure Boot te omzeilen en zo het systeem te compromitteren. Het probleem is inmiddels door de betrokken lever ... Read more

-
Dark Reading
Trusted Apps Sneak a Bug Into the UEFI Boot Process
Source: Ognyan Yosifov via Alamy Stock PhotoA vulnerability in trusted system recovery programs could allow privileged attackers to inject malware directly into the system startup process in Unified E ... Read more

-
Help Net Security
New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
ESET researchers have identified a vulnerability (CVE-2024-7344) impacting most UEFI-based systems, which allows attackers to bypass UEFI Secure Boot. The issue was found in a UEFI application signed ... Read more

-
Cybersecurity News
13,000 MikroTik Routers Hijacked for Global Malspam Operation
A recent report from Infoblox Threat Intel highlights a sophisticated botnet operation leveraging a simple DNS misconfiguration to distribute malware on a massive scale. This botnet, built on approxim ... Read more

-
The Hacker News
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks. O ... Read more

-
tripwire.com
VERT Threat Alert: January 2025 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1139 as soon as coverage is completed.In ... Read more

-
BleepingComputer
Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws
Today is Microsoft's January 2025 Patch Tuesday, which includes security updates for 159 flaws, including eight zero-day vulnerabilities, with three actively exploited in attacks.This Patch Tuesday al ... Read more
The following table lists the changes that have been made to the
CVE-2024-7344
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Jan. 22, 2025
Action Type Old Value New Value Changed Reference Type https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ No Types Assigned https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ Exploit, Mitigation, Third Party Advisory -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jan. 21, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Removed CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Added Reference https://www.kb.cert.org/vuls/id/529659 Added Reference https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ -
Reanalysis by [email protected]
Jan. 21, 2025
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 -
Reanalysis by [email protected]
Jan. 21, 2025
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 OR *cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 -
Initial Analysis by [email protected]
Jan. 21, 2025
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Added CWE NIST CWE-347 Added CPE Configuration OR *cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* versions up to (excluding) 10.1.024-20241127 *cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023-20240927 *cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* versions up to (excluding) 10.2.023_20240919 *cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* versions up to (excluding) 11.2.023-20240927 *cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.024-20241127 *cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.021-20241127 *cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* versions up to (excluding) 8.4.022-20241127 Changed Reference Type https://uefi.org/revocationlistfile No Types Assigned https://uefi.org/revocationlistfile Patch Changed Reference Type https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html No Types Assigned https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html Related Changed Reference Type https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html No Types Assigned https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html Related Changed Reference Type https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ No Types Assigned https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ Related Changed Reference Type https://www.kb.cert.org/vuls/id/529659 No Types Assigned https://www.kb.cert.org/vuls/id/529659 Third Party Advisory, US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jan. 14, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Jan. 14, 2025
Action Type Old Value New Value Added Reference https://www.kb.cert.org/vuls/id/529659 -
New CVE Received by [email protected]
Jan. 14, 2025
Action Type Old Value New Value Added Description Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path. Added Reference https://uefi.org/revocationlistfile Added Reference https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html Added Reference https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html Added Reference https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-7344
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-7344
weaknesses.