Howyar Reloader UEFI Application: UEFI Secure Boot bypass (CVE-2024-7344) #shorts

Summary

Today on our podcast, we delve into a critical new vulnerability identified as CVE-2024-7344. This vulnerability pertains to a UEFI Secure Boot bypass in several software applications, including those from Howyar Technologies. The vulnerability allows attackers to deploy malicious bootkits by bypassing Secure Boot protections, raising significant concerns for device security and integrity.

Product details

CVE-2024-7344 affects multiple products across different technology providers. The affected products include Radix SmartRecovery, Greenware Technologies GreenGuard, Howyar Technologies SysReturn, SANFONG EZ-Back System, CES Taiwan's CES NeoImpact, and SignalComputer's HDD King. The vulnerability impacts all versions less than specific builds, necessitating urgent updates to secure these systems.

Vulnerability type summary

The vulnerability is categorized under CWE-426: Untrusted Search Path and CWE-347: Lack or Improper Verification of Cryptographic Signature. These categorizations indicate issues with software execution in secure environments without adequate verification, thereby allowing potentially harmful unsigned software to be executed.

Details of the vulnerability

The vulnerability discovered by researchers at ESET relates to the Howyar UEFI Application 'Reloader'. It involves execution of unsigned software in a hardcoded path, which bypasses Secure Boot protections and could potentially lead to privilege escalation. The critical nature of this vulnerability stems from its capability to undermine Secure Boot, a core security feature intended to prevent unauthorized boot code from running on a device.

Conclusion

In conclusion, CVE-2024-7344 represents a significant security risk as it compromises the Secure Boot process, allowing potential bootkit deployment. It is crucial for affected users to apply the recommended patches immediately to mitigate possible exploitation. As of now, no active exploit has been reported, but the potential implications underline the importance of maintaining up-to-date security measures.

Watch the full video on YouTube: CVE-2024-7344

Remediation and exploitation details

This chain involves the following actors

This following systems are involved

Attack entry point

Remediation actions

Exploitation actions

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2024-7344
Description
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
Provider
certcc
CWE / problem types
CWE-426: Untrusted Search Path,CWE-347: Lack/Improper Verification of Cryptographic Signature
Affected Software Versions
Radix:SmartRecovery:[{'status': 'affected', 'version': '*', 'lessThan': '11.2.023-20240927', 'versionType': 'custom'}],Greenware Technologies:GreenGuard:[{'status': 'affected', 'version': '*', 'lessThan': '10.2.023-20240927', 'versionType': 'custom'}],Howyar Technologies:SysReturn (32-bit and 64-bit):[{'status': 'affected', 'version': '*', 'lessThan': '10.2.02320240919', 'versionType': 'custom'}],SANFONG:SANFONG EZ-Back System:[{'status': 'affected', 'version': '*', 'lessThan': '10.3.024-20241127', 'versionType': 'custom'}],CES Taiwan:CES NeoImpact:[{'status': 'affected', 'version': '*', 'lessThan': '10.1.024-20241127', 'versionType': 'custom'}],SignalComputer:HDD King:[{'status': 'affected', 'version': '*', 'lessThan': '10.3.021-20241127', 'versionType': 'custom'}]
Date Published
2025-01-14T13:29:56.915Z
Last Updated
2025-02-12T14:50:39.596Z