Microsoft Corporation has introduced a new vulnerability in UEFI booting.

Programming

Microsoft Corporation has introduced a new vulnerability in UEFI booting.

Details have emerged about a patched security vulnerability that could allow bypassing the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. According to new research from https://xrust.ru/, the vulnerability, identified as CVE-2024-7344, is located in the UEFI application signed by the third-party certificate “Microsoft Corporation UEFI CA 2011.” This vulnerability could lead to the execution of untrusted code during system boot, allowing attackers to deploy malicious UEFI bootkits on computers with Secure Boot enabled, regardless of the installed operating system. Secure Boot is a firmware security standard that prevents malware from loading when a computer starts. This feature uses digital signatures to verify the authenticity, source, and integrity of the code being loaded. The vulnerable UEFI application is part of several real-time system recovery software packages developed by Howyar Technologies, Greenware Technologies, Radix Technologies, SANFONG, and Wasay Software Technology.

https://xrust.ru/news/310672-microsoft-corporation-prinesla-novuju-ujazvimost-zagruzke-uefi.html

Rate article
Xrust.online
Add a comment