Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
History

Wed, 12 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Radix smart Recovery
CPEs cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:*
Vendors & Products Radix smartrecovery
Radix smart Recovery

Tue, 21 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Cs-grp
Cs-grp neo Impact
CPEs cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:*
Vendors & Products Ces
Ces neoimpact
Cs-grp
Cs-grp neo Impact

Tue, 21 Jan 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Ces
Ces neoimpact
Greenware
Greenware greenguard
Howyar
Howyar sysreturn
Radix
Radix smartrecovery
Sanfong
Sanfong ez-back System
Signalcomputer
Signalcomputer hdd King
Wasay
Wasay erecoveryrx
Weaknesses CWE-347
CPEs cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:*
cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:*
cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:*
cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:*
cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:*
cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:*
cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:*
Vendors & Products Ces
Ces neoimpact
Greenware
Greenware greenguard
Howyar
Howyar sysreturn
Radix
Radix smartrecovery
Sanfong
Sanfong ez-back System
Signalcomputer
Signalcomputer hdd King
Wasay
Wasay erecoveryrx

Fri, 17 Jan 2025 01:30:00 +0000


Tue, 14 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 15:45:00 +0000

Type Values Removed Values Added
References

Tue, 14 Jan 2025 13:45:00 +0000

Type Values Removed Values Added
Description Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
Title Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-02-12T14:50:39.596Z

Reserved: 2024-07-31T16:05:09.477Z

Link: CVE-2024-7344

cve-icon Vulnrichment

Updated: 2025-01-14T15:02:40.649Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-14T14:15:34.930

Modified: 2025-01-22T15:41:04.577

Link: CVE-2024-7344

cve-icon Redhat

Severity : Important

Publid Date: 2025-01-14T13:29:56Z

Links: CVE-2024-7344 - Bugzilla