cpu-motherboard

New UEFI Secure Boot flaw exposes systems to bootkits, patch now

Share:

A new UEFI Secure Boot bypass vulnerability tracked as CVE-2024-7344 that affects a Microsoft-signed application could be exploited to deploy bootkits even if Secure Boot protection is active.

The vulnerable UEFI application is present in multiple real-time system recovery tools from several third-party software developers.

Bootkits represent a critical security threat that is difficult to detect because they take action before the operating system loads, and survive OS re-installs.

Underlying problem

The issue stems from the application using a custom PE loader, which allows loading any UEFI binary, even if they are not signed.

Specifically, the vulnerable UEFI application does not rely on trusted services like ‘LoadImage’ and ‘StartImage’ that validate binaries against a trust database (db) and a revocation database (dbx).

In this context, ‘reloader.efi’ manually decrypts and loads into memory binaries from ‘cloak.dat’, which contains a rudimentary encrypted XOR PE image.

This unsafe process could be exploited by an attacker by replacing the app’s default OS bootloader on the EFI partition with a vulnerable ‘reloader.efi’ and planting a malicious ‘cloak.dat’ file on its nominal paths.

Upon system boot, the custom loader will decrypt and execute the malicious binary without Secure Boot validation.

UEFI Secure Boot process
UEFI Secure Boot process
Source: ESET

Scope of impact

The vulnerability affects UEFI applications designed to assist in system recovery, disk maintenance, or backups and are not general-purpose UEFI applications.

ESET’s report lists the following products and versions as vulnerable:

  • Howyar SysReturn before version 10.2.023_20240919
  • Greenware GreenGuard before version 10.2.023-20240927
  • Radix SmartRecovery before version 11.2.023-20240927
  • Sanfong EZ-back System before version 10.3.024-20241127
  • WASAY eRecoveryRX before version 8.4.022-20241127
  • CES NeoImpact before version 10.1.024-20241127
  • SignalComputer HDD King before version 10.3.021-20241127

It should be noted that attackers could exploit CVE-2024-7344 even if the above applications are not present on the target computer. The hackers could perform the attack by deploying only the vulnerable ‘reloader. efi’ binary from those apps.

However, those using the above apps and impacted versions should move to the newer releases as soon as possible to eliminate the attack surface.

ESET published a video to demonstrate how the vulnerability could be exploited on a system that has Secure Boot enabled

Fixes and mitigations

Microsoft has released a patch for CVE-2024-7344

ESET discovered the vulnerability on July 8, 2024, and reported it to the CERT Coordination Center (CERT/CC) for coordinated disclosure to the impacted parties.

Affected vendors fixed the issue in their products and Microsoft revoked the certificates on January 14th Patch Tuesday update

In the following months, ESET worked with the affected vendors to evaluate the proposed patches and eliminate the security problem.

Eventually, on January 14, 2025, Microsoft revoked the certificates of vulnerable UEFI applications, which should block any attempts to execute their binaries.

This mitigation is automatically applied to users who installed the latest Windows update. ESET also shared PowerShell commands that admins of critical systems can use to manually check if the revocations have been successfully applied.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:20 am, Jul 13, 2025
weather icon 21°C
L: 20° | H: 22°
clear sky
Humidity: 64 %
Pressure: 1013 mb
Wind: 4 mph NE
Wind Gust: 5 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 2%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:58 am
Sunset: 9:13 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
20° | 22°°C 0 mm 0% 6 mph 58 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
19° | 27°°C 0 mm 0% 15 mph 71 % 1015 mb 0 mm/h
Tue Jul 15 10:00 pm
weather icon
15° | 22°°C 1 mm 100% 17 mph 85 % 1016 mb 0 mm/h
Wed Jul 16 10:00 pm
weather icon
14° | 27°°C 0.11 mm 11% 11 mph 85 % 1017 mb 0 mm/h
Thu Jul 17 10:00 pm
weather icon
18° | 27°°C 1 mm 100% 13 mph 95 % 1015 mb 0 mm/h
Today 1:00 pm
weather icon
23° | 27°°C 0 mm 0% 3 mph 58 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
27° | 30°°C 0 mm 0% 0 mph 40 % 1011 mb 0 mm/h
Today 7:00 pm
weather icon
27° | 27°°C 0 mm 0% 6 mph 31 % 1008 mb 0 mm/h
Today 10:00 pm
weather icon
23° | 23°°C 0 mm 0% 6 mph 40 % 1010 mb 0 mm/h
Tomorrow 1:00 am
weather icon
19° | 19°°C 0 mm 0% 5 mph 40 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
20° | 20°°C 0 mm 0% 5 mph 52 % 1010 mb 0 mm/h
Tomorrow 7:00 am
weather icon
19° | 19°°C 0 mm 0% 9 mph 71 % 1011 mb 0 mm/h
Tomorrow 10:00 am
weather icon
23° | 23°°C 0 mm 0% 12 mph 54 % 1012 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€100,870.29
-0.06%
Ethereum(ETH)
€2,527.51
-0.43%
XRP(XRP)
€2.39
-0.49%
Tether(USDT)
€0.86
0.00%
Solana(SOL)
€138.69
-0.26%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.169565
-1.19%
Shiba Inu(SHIB)
€0.000011
-1.36%
Pepe(PEPE)
€0.000010
-2.44%
Peanut the Squirrel(PNUT)
€0.246209
7.19%
Scroll to Top