Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
https://www.kb.cert.org/vuls/id/529659
https://securityaffairs.com/173175/security/flaw-bypass-secure-boot-in-uefi-systems.html
https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
https://www.helpnetsecurity.com/2025/01/16/uefi-secure-boot-bypass-vulnerability-cve-2024-7344/
https://www.bleepingcomputer.com/news/security/new-uefi-secure-boot-flaw-exposes-systems-to-bootkits-patch-now/
https://thehackernews.com/2025/01/new-uefi-secure-boot-vulnerability.html
https://arstechnica.com/security/2025/01/microsoft-patches-windows-to-eliminate-secure-boot-bypass-threat/
https://kb.cert.org/vuls/id/529659
https://www.eset.com/blog/enterprise/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence/
https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html
https://uefi.org/specs/UEFI/2.10/03_Boot_Manager.html
https://uefi.org/revocationlistfile
Source: Mitre, NVD
Published: 2025-01-14
Updated: 2025-01-22
Base Score: 6.5
Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C
Severity: Medium
Base Score: 8.2
Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Severity: High
EPSS: 0.00017