search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Howyar Reloader UEFI bootloader vulnerable to unsigned software execution

Vulnerability Note VU#529659

Original Release Date: 2025-01-14 | Last Revised: 2025-01-14

Overview

The Howyar UEFI Application "Reloader" (32-bit and 64-bit), distributed as part of SysReturn prior to version 10.2.02320240919, is vulnerable to the execution of arbitrary software from a hard-coded path. An attacker who successfully exploits this vulnerability can bypass the UEFI Secure Boot feature and execute unsigned code during the boot process in the UEFI context.

Description

The Unified Extensible Firmware Interface (UEFI) is a specification for firmware architecture that facilitates interaction between a computing platform’s hardware and operating system during the early boot phase. When a UEFI-compliant computer is powered on, the UEFI implementation (including multiple UEFI applications) is the first software to run, preceding the operating system. UEFI applications are typically digitally signed, often by the Microsoft UEFI Certificate Authority (CA), ensuring their trusted execution under UEFI Secure Boot. UEFI bootloaders, a type of UEFI application, provide early boot management, loading OS files into protected memory areas for execution. These bootloaders can execute additional software and load drivers as part of their startup processes.

The Howyar Reloader UEFI application, an UEFI bootloader available in both 32-bit and 64-bit versions, has been found to contain an arbitrary code execution vulnerability. Researchers at ESET discovered that the application allows execution of UEFI software from a hard-coded path without verifying its signature. This occurs because the Reloader does not use UEFI’s standard BootServices LoadImage() API for safe application execution. Consequently, any unsigned third-party software can be executed during the early boot phase with high privileges in the UEFI context. Since the Reloader application is signed by the trusted Microsoft UEFI CA, it can be installed on any UEFI-compliant system. Furthermore, as it is bundled and distributed as part of supply-chain software, it may also be present in other UEFI implementations provided by software suppliers or OEMs.

An attacker with the ability to update the UEFI bootloader can exploit this vulnerability to run arbitrary code, bypassing UEFI Secure Boot. On systems where a vulnerable version of the Reloader application is present, an attacker only needs to install a malicious unsigned UEFI application in a hard-coded path to achieve Secure Boot bypass and execute code in the UEFI context.

To mitigate this vulnerability, updated Reloader should be installed on the affected systesm. It is also essential that all UEFI compliant computers also update their Secure Boot Forbidden Signature Database (DBX or Revocation List), supplied by the UEFI Forum. This update should be applied to the special SPI flash memory on the motherboard, which stores firmware data. Maintaining the integrity of the UEFI Secure Boot ecosystem requires the timely application of these updates.

Impact

An attacker can bypass Secure Boot at system startup and execute arbitrary code before the operating system (OS) loads. Code executed in this early boot phase can persist on the system, potentially loading malicious kernel extensions that survive both reboots and OS reinstallation. Additionally, it may evade detection by OS-based and endpoint detection and response (EDR) security measures.

Solution

Apply a Patch

Howyar Technologies and their partners have released updated software to address this vulnerability. Please follow their guidance to install the updated version of the software. Additionally, Microsoft has indicated that they intend to provide an updated DBX (Revocation List) file around January 14, 2025. These updates may also be delivered by your OEM or OS vendor to ensure the Secure Boot Forbidden Signature Database (DBX) is up to date.

Recommendations for Enterprises and Developers

As changes to the DBX file can lead to system instability, vendors are urged to thoroughly test the updates to ensure they do not render systems unusable. Enterprises and cloud providers managing large numbers of systems should prioritize applying these updates and ensure the DBX file changes are implemented reliably to prevent loading of unsigned binaries in the virtual machine boot process.

Acknowledgements

Thanks to Martin Smolar of ESET for his responsible disclosure of this vulnerability to Howyar Technologies and other affected vendors. Thanks also to Howyar Technologies that closely worked with the researcher and CERT/CC to resolve this vulnerability. This document was written by Vijay Sarvepalli.

Vendor Information

529659
 

UEFI Security Response Team Affected

Notified:  2024-07-23 Updated: 2025-01-14

Statement Date:   July 31, 2024

CVE-2024-7344 Affected

Vendor Statement

The UEFI Forum does not provide code that could be affected by this issue. We will work with the Microsoft UEFI CA on any requirement to add this to the firmware signature revocation list.

Intel Not Affected

Notified:  2024-07-30 Updated: 2025-01-14

Statement Date:   August 06, 2024

CVE-2024-7344 Not Affected

Vendor Statement

Checked with internal BIOS teams as well as SDL and this is not used at Intel.

Toshiba Corporation Not Affected

Notified:  2024-07-30 Updated: 2025-01-14

Statement Date:   August 21, 2024

CVE-2024-7344 Not Affected

Vendor Statement

We have not received a statement from the vendor.

Amazon Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

ASUSTeK Computer Inc. Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Debian GNU/Linux Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Dell Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fujitsu Europe Unknown

Notified:  2024-07-30 Updated: 2025-01-14

Statement Date:   July 31, 2024

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fujitsu HQ Unknown

Notified:  2024-08-06 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

GETAC Inc. Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Google Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Greenware Technologies Unknown

Notified:  2024-07-23 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Hewlett Packard Enterprise Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Howyar Taiwan Unknown

Notified:  2024-07-23 Updated: 2025-01-14

Statement Date:   August 06, 2024

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

HP Inc. Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Lenovo Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Microsoft Unknown

Notified:  2024-07-23 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Microsoft Vulnerability Research Unknown

Notified:  2024-07-23 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Radix Unknown

Notified:  2024-07-23 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

ReactOS Unknown

Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Red Hat Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Star Labs Online Limited Unknown

Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

Ubuntu Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

VAIO Corporation Unknown

Notified:  2024-07-30 Updated: 2025-01-14

CVE-2024-7344 Unknown

Vendor Statement

We have not received a statement from the vendor.

View all 24 vendors View less vendors


Other Information

CVE IDs: CVE-2024-7344
API URL: VINCE JSON | CSAF
Date Public: 2025-01-14
Date First Published: 2025-01-14
Date Last Updated: 2025-01-14 14:52 UTC
Document Revision: 2

Sponsored by CISA.