UEFI Security Boot CVE-2024-7344

I don’t think the FW laptop is affected. Only the following EFI components are affected, and I don’t think the FW laptop has any of them:
Howyar SysReturn before version 10.2.023_20240919
Greenware GreenGuard before version 10.2.023-20240927
Radix SmartRecovery before version 11.2.023-20240927
Sanfong EZ-back System before version 10.3.024-20241127
WASAY eRecoveryRX before version 8.4.022-20241127
CES NeoImpact before version 10.1.024-20241127
SignalComputer HDD King before version 10.3.021-20241127

They are all 3rd party recovery tools, so don’t come with a FW laptop.

As far as I can tell, the issue is that the aforementioned applications are signed with a key that is trusted by the default secure boot configuration on most devices, and then load and execute a file without doing any integrity checks (or passing it off to the standard EFI execution mechanisms which would perform the standard secure boot integrity checks), allowing that file to be replaced with malicious code.

So kind of like a bring-your-own-vulnerable-driver attack (just in the boot process this time)

FWIW the AMD FW13 is able to boot without the microsoft secure boot key.

3 Likes