Loading HuntDB...

CVE-2024-7344

UNKNOWN
Published 2025-01-14T13:29:56.915Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-7344. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.2
/10
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.001
probability
of exploitation in the wild

There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.278
Higher than 27.8% of all CVEs

Attack Vector Metrics

Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

Available Exploits

No exploits available for this CVE.

Related News

HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot

ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware, augmented with the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on …

Help Net Security 2025-09-12 15:04
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) …

Internet 2025-09-12 11:50
Microsoft finally patches serious UEFI Secure Boot flaw after seven-month delay

The vulnerability (CVE-2024-7344) allowed bad actors to sneak malicious code onto devices in a way that could bypass many of Windows 11's built-in security defenses. It exploited a flaw in how certain third-party firmware utilities handled secure UEFI boot pr…

TechSpot 2025-01-19 15:52
Microsoft blocks critical Secure Boot loophole after over 7 months — fortifying Windows 11 against sophisticated firmware attacks camouflaged as verified UEFI apps

Microsoft finally patched the security threat (CVE-2024-7344), allowing bad actors to gain unauthorized access to Windows 11 by bypassing Secure Boot for over 7 months.

Windows Central 2025-01-17 17:26
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems

Researchers detailed a now-patched vulnerability that could allow a bypass of the Secure Boot mechanism in UEFI systems. ESET disclosed details of a now-patched vulnerability, tracked as CVE-2024-7344 (CVSS score: 6.7), that could allow a bypass of the Secure…

Securityaffairs.com 2025-01-17 11:15

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-7xfj-4r7x-3733

Advisory Details

Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: January 14, 2025, Modified: January 21, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

8 posts
Reddit 6 days, 11 hours ago
Sarunas

Naujas „HybridPetya“ išpirkos reikalaujantis virusas gali apeiti UEFI Secure Boot Neseniai aptikta išpirkos reikalaujanti kenkėjiška programa HybridPetya geba apeiti UEFI Secure Boot apsaugą ir įdiegti kenkėjišką aplikaciją EFI sistemos skaidinyje. Ši grėsmė, pasirodžiusi „VirusTotal“ platformoje, atrodo įkvėpta destruktyvių Petya ir NotPetya atakų iš 2016–2017 metų, kurios užšifruodavo kompiuterius ir neleisdavo …

Reddit 1 week ago
technadu
Exploit PoC

HybridPetya ransomware bypasses UEFI Secure Boot Researchers at ESET have discovered a new ransomware strain called HybridPetya that can bypass UEFI Secure Boot by exploiting CVE-2024-7344. Key points: * Installs into the EFI System Partition * Mimics Petya/NotPetya ransomware behavior (fake CHKDSK, ransom note, destructive encryption) * Not yet seen …

3
3.0
View Original High Risk
Reddit 1 week, 1 day ago
hasamba
Exploit

HYBRIDPETYA: UEFI SECURE BOOT BYPASS VIA CVE-2024-7344 TL;DR: New VirusTotal samples named HybridPetya mimic Petya/NotPetya but add a UEFI infection path; one variant exploits CVE‑2024‑7344 (cloak.dat) to bypass Secure Boot and install an EFI app that encrypts the NTFS MFT. - Scope/impact: Targets NTFS MFT encryption and UEFI boot integrity; …

1
1.0
View Original High Risk
Reddit 1 week, 1 day ago
quellaman
Exploit

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

2
2.0
View Original High Risk
Reddit 1 week, 1 day ago
falconupkid
Exploit

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible... **CVEs:** CVE-2024-7344 **Source:** https://thehackernews.com/2025/09/new-hybridpetya-ransomware-bypasses.html

1
1.0
View Original High Risk
Reddit 1 week, 1 day ago
TheCyberSecurityHub
Exploit

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

1
1.0
View Original High Risk
Reddit 2 months, 3 weeks ago
Masayoshii

Legion Pro 7i Gen 9 / 16IRX9H, June 25 BIOS N2CN27WW Available for Download **June 25, BIOS N2CN27WW is available for Legion Pro 7i Gen 9 / 16IRX9H**, and **brings Microcode Update revision to 12E** and release notes below: [https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/legion-series/legion-pro-7-16irx9h/83de/83de001sus/downloads/ds567127-bios-update-for-windows-10-64-bit-legion-pro-7-16irx9h?category=BIOS%2FUEFI](https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/legion-series/legion-pro-7-16irx9h/83de/83de001sus/downloads/ds567127-bios-update-for-windows-10-64-bit-legion-pro-7-16irx9h?category=BIOS%2FUEFI) Note: During upgrade, you'll see an initial progress indicator > …

Reddit 3 months ago
Alternative-Wave-185

New Gen8 Bios KWCN50WW with Intel Microcode 0x12e Hi Board, there is a new Bios Update KWCN50WW for the following devices. It also contains Intel Microcode 0x12e as undocumented change. [https://download.lenovo.com/consumer/mobiles/kwcn50ww.exe](https://download.lenovo.com/consumer/mobiles/kwcn50ww.exe) [https://download.lenovo.com/consumer/mobiles/kwcn50ww.txt](https://download.lenovo.com/consumer/mobiles/kwcn50ww.txt) >Legion Pro 5 16IRX8/Lenovo Legion Pro 5 16IRX8/Legion Y9000P IRX8/Legion Pro 7 16IRX8H/Lenovo Legion Pro 7 16IRX8H/Legion Y9000P …

8
14
36.0

References

Published: 2025-01-14T13:29:56.915Z
Last Modified: 2025-02-12T14:50:39.596Z
Copied to clipboard!