CVE-2024-7344
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2025
Last modified:
22/01/2025
Description
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* | 10.1.024-20241127 (excluding) | |
| cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* | 10.2.023-20240927 (excluding) | |
| cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* | 10.2.023_20240919 (excluding) | |
| cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* | 11.2.023-20240927 (excluding) | |
| cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* | 10.3.024-20241127 (excluding) | |
| cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* | 10.3.021-20241127 (excluding) | |
| cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* | 8.4.022-20241127 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://uefi.org/revocationlistfile
- https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html
- https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html
- https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/
- https://www.kb.cert.org/vuls/id/529659
- https://www.kb.cert.org/vuls/id/529659
- https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/



