Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://uefi.org/revocationlistfile | patch |
https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html | related |
https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html | related |
https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/ | related |
https://www.kb.cert.org/vuls/id/529659 | third party advisory us government resource |
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ | exploit mitigation third party advisory |