### [CVE-2024-7344](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7344) ![](https://img.shields.io/static/v1?label=Product&message=CES%20NeoImpact&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=GreenGuard&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=HDD%20King&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SANFONG%20EZ-Back%20System&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SmartRecovery&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SysReturn%20(32-bit%20and%2064-bit)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Lack%2FImproper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%3A%20Untrusted%20Search%20Path&color=brightgreen) ### Description Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path. ### POC #### Reference - https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html - https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ #### Github - https://github.com/0xAtef/0xAtef - https://github.com/DevGreick/devgreick - https://github.com/felipealfonsog/felipealfonsog - https://github.com/francolop/0XC0DE-TP3 - https://github.com/frlc/frlc