No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Trusted Apps Sneak a Bug Into UEFI Boot Process

January 16, 2025
in Protection
0
Trusted Apps Sneak a Bug Into UEFI Boot Process


A vulnerability in trusted system recovery programs could allow privileged attackers to inject malware directly into the system startup process in Unified Extensible Firmware Interface (UEFI) devices.

Seven real-time recovery products — Howyar SysReturn, Greenware GreenGuard, Radix SmartRecovery, Sanfong EZ-back System, WASAY eRecoveryRX, CES NeoImpact, and SignalComputer HDD King — all make use of “reloader.efi,” the Microsoft-signed Extensible Firmware Interface (EFI) file at issue.

The problem, ESET explains in a new report, is that reloader.efi uses a custom loader that enables the application to load even unsigned binaries during the boot process. In essence, it’s a backdoor for sneaking any kind of file into a system’s startup, past UEFI Secure Boot. The issue has been assigned CVE-2024-7344, and earned a “medium” 6.5 Common Vulnerability Scoring System (CVSS) rating, as it requires administrator privileges to exploit.

Backdoor to the UEFI Boot Process

The standard way to load, prepare, and execute UEFI images in system memory is with the autological LoadImage and StartImage functions. The Microsoft-approved “reloader” application goes its own way, using a custom mechanism that allows it to load any binary, trusted or otherwise, at startup.

“Maybe it’s a lack of secure coding awareness,” Martin Smolár, malware researcher at ESET, guesses of the developers’ motives in implementing the custom loader. “Or maybe it’s because they found it convenient to create such a functionality. Because when a developer makes a change [to a signed program] they need to send it to Microsoft to get it re-signed. This means that they don’t need to every time they create a new update or something like that.”

Reloader.efi loads arbitrary binaries from a specific, encrypted file, “cloak.dat.” When ESET decrypted cloak.dat, it found that it contained an unsigned executable primarily designed for classroom environments. “Its core function is to provide real-time system recovery, ensuring that students from different classes can work in a teacher-predefined computer environment within shared computer labs,” Smolár says, though he adds that the same component might be used in other settings, like public Internet cafes. The larger point is that the unsigned executable is run during the startup process, completely bypassing UEFI Secure Boot checks.

This odd classroom recovery software is perfectly honest, but an attacker could easily swap it out for something worse. If they could just get a hold of administrator privileges on a targeted machine, an attacker could access the EFI system partition (ESP) and substitute their own malicious file in place of cloak.dat. Then all they’d need is a quick system reboot to drop any malicious file they wished into the startup process.

Why UEFI Bugs Are So Bad

UEFI is a kind of sacred space — a bridge between firmware and operating system, allowing a machine to boot up in the first place.

Any malware that invades this space will earn a dogged persistence through reboots, by reserving its own spot in the startup process. Security programs have a harder time detecting malware at such a low level of the system. Even more importantly, by loading first, UEFI malware will simply have a head start over those security checks that it aims to avoid. Malware authors take advantage of this order of operations by designing UEFI bootkits that can hook into security protocols, and undermine critical security mechanisms like UEFI Secure Boot or HVCI (Hypervisor-Protected Code Integrity), Windows’ technology for blocking unsigned code in the kernel.

To ensure that none of this can happen, the UEFI Boot Manager verifies every boot application binary against two lists: “db,” which includes all signed and trusted programs, and “dbx,” including all forbidden programs. But when a vulnerable binary is signed by Microsoft, the matter is moot.

Microsoft maintains a list of requirements for signing UEFI binaries, but the process is a bit obscure, Smolár says. “I don’t know if it involves only running through this list of requirements, or if there are some other activities involved, like manual binary reviews where they look for not necessarily malicious, but insecure behavior,” he says. Microsoft has previously alluded to UEFI binaries being “approved through manual review.” Dark Reading has reached out to the company for more clarity on this point.

ESET first discovered CVE-2024-7344 in July 2024. Since then, all vulnerable applications have been fixed, and Microsoft revoked the old, vulnerable binaries in its Jan. 14, 2025, Patch Tuesday update.



Editorial Team

Editorial Team

Related Posts

Disney Is Killing the Hulu App
Protection

Disney Is Killing the Hulu App

August 6, 2025
Protection

What I Learned From Downloading My Poshmark Data (and Where to Find Yours)

August 5, 2025
You Might Have Sent Your ChatGPT Conversations to Google
Protection

You Might Have Sent Your ChatGPT Conversations to Google

August 4, 2025
The M1 MacBook Air Is Down to $600 Right Now
Protection

The M1 MacBook Air Is Down to $600 Right Now

August 3, 2025
Apple's Latest Security Patch Fixes a Zero-Day Vulnerability Targeting Chrome
Protection

Apple’s Latest Security Patch Fixes a Zero-Day Vulnerability Targeting Chrome

August 2, 2025
Why You Can't Rely on Skechers' AirTag Sneakers to Track Your Kids
Protection

Why You Can’t Rely on Skechers’ AirTag Sneakers to Track Your Kids

August 1, 2025
Load More
Next Post
Linda McMahon and Elon Musk attend the America First Policy Institute Gala held at Mar-a-Lago

A lesson for oligarchs: politics can be deadly

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • Pandion hires NYC pension expert to boost offering

    0 shares
    Share 0 Tweet 0
  • Satsuma Raises $217M, Now UK’s #2 Bitcoin Holder

    0 shares
    Share 0 Tweet 0

Latest News

Gate joins Global Dollar Network as a first-tier partner, leading stablecoin adoption

Gate joins Global Dollar Network as a first-tier partner, leading stablecoin adoption

August 6, 2025
0

Key Takeaways Gate joined Global Dollar Network as a first-tier partner, integrating USDG stablecoin support for its 34 million users....

Click to unlock: Shoppers have to 'tap to unlock' their Your Nectar Prices online or on the app to use in-store or online

Sainsbury’s makes major change to shopping as supermarket introduces Tesco Clubcard style savings

August 6, 2025
0

Products featured in this article are independently selected by This is Money's specialist journalists. If you open an account using...

FTC seeks to block Edwards Lifesciences' acquisition of JenaValve

FTC seeks to block Edwards Lifesciences' acquisition of JenaValve

August 6, 2025
0

FTC seeks to block Edwards Lifesciences' acquisition of JenaValve

The Best Apps for Managing Your Travel Expenses and Receipts

The Best Apps for Managing Your Travel Expenses and Receipts

August 6, 2025
0

Work trips can be exhausting and full of small expenses that quickly add up. Between the Ubers to and from...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.