CyberSecurity updates
2025-01-17 20:50:15 Pacfic

UEFI Secure Boot Bypass Vulnerability Discovered. - 20h
Read more: securityonline.info

A new UEFI Secure Boot bypass vulnerability, identified as CVE-2024-7344, has been discovered, posing a significant threat to a wide range of UEFI-based systems. This flaw resides within a signed UEFI application, specifically the Howyar Reloader bootloader, and allows attackers to execute unsigned code during the boot process. The vulnerability stems from the bootloader's failure to use UEFI’s standard BootServices LoadImage API, instead utilizing a custom PE loader that does not verify signatures of loaded software. This oversight allows for the loading of any UEFI binary, including malicious ones, from a specifically named file, even on systems with Secure Boot enabled.

The exploitation of CVE-2024-7344 enables attackers to deploy malicious UEFI bootkits, granting them persistent access to compromised machines. Malicious code executed during this early phase can persist through system reboots and even OS reinstallations. Attackers can also load malicious kernel extensions, achieving long-term control and potentially evading endpoint detection and response tools and other security measures. This vulnerability affects various system recovery software suites from vendors including Howyar Technologies, Greenware Technologies, Radix Technologies, SANFONG, Wasay Software Technology, Computer Education System, and Signal Computer. To mitigate this risk, users are urged to install updated versions of the vulnerable bootloaders and update the UEFI Secure Boot Forbidden Signature Database (DBX).