cve/2024/CVE-2024-7344.md

29 lines
1.5 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-7344](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7344)
![](https://img.shields.io/static/v1?label=Product&message=CES%20NeoImpact&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GreenGuard&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=HDD%20King&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SANFONG%20EZ-Back%20System&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SmartRecovery&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SysReturn%20(32-bit%20and%2064-bit)&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Lack%2FImproper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%3A%20Untrusted%20Search%20Path&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html
- https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
2025-09-29 16:08:36 +00:00
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/0xAtef/0xAtef
- https://github.com/DevGreick/devgreick
- https://github.com/felipealfonsog/felipealfonsog
2025-09-29 16:08:36 +00:00
- https://github.com/francolop/0XC0DE-TP3
2025-09-29 21:09:30 +02:00
- https://github.com/frlc/frlc
2025-09-29 16:08:36 +00:00