8.2 CVE-2024-7344

Patch Exploit
 

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
https://nvd.nist.gov/vuln/detail/CVE-2024-7344

Categories

CWE-347 : Improper Verification of Cryptographic Signature
The product does not verify, or incorrectly verifies, the cryptographic signature for data. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Does not properly verify signatures for "trusted" entities. Insufficient verification allows spoofing. Insufficient verification allows spoofing. Accepts a configuration file without a Message Integrity Check (MIC) signature.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit

https://www.kb.cert.org/vuls/id/529659
Third Party Advisory US Government Resource
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-...
Exploit Mitigation Third Party Advisory

af854a3a-2127-422b-91ae-364da2661108 Exploit

https://www.kb.cert.org/vuls/id/529659
Third Party Advisory US Government Resource

cret@cert.org Patch Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* < 10.1.024-20241127
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* < 10.2.023-20240927
cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* < 10.2.023_20240919
cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* < 11.2.023-20240927
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* < 10.3.024-20241127
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* < 10.3.021-20241127
cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* < 8.4.022-20241127


REMEDIATION


Patch

Url
https://uefi.org/revocationlistfile


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
463 Padding Oracle Crypto Attack
High
475 Signature Spoofing by Improper Validation
High