TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Seven-month Windows 11 security hole finally closed by Microsoft

Seven-month Windows 11 security hole finally closed by Microsoft

The vulnerability allowed malicious actors to infiltrate devices and bypass many of Windows 11's built-in security defenses

Kerem GülenbyKerem Gülen
20 January 2025
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

Microsoft has addressed a critical security vulnerability (CVE-2024-7344) affecting Windows 11, which had remained unpatched for over seven months, exposing the system to potential malware attacks.

Details of the vulnerability

The vulnerability allowed malicious actors to infiltrate devices and bypass many of Windows 11‘s built-in security defenses. It exploited a flaw in the handling of secure UEFI boot processes by certain third-party firmware utilities, granting attackers elevated system privileges.

This flaw made it possible for malicious payloads to hide from detection, as firmware-based attacks are notably difficult to identify. The issue originated from how some legitimate system utilities improperly utilized Microsoft-approved digital certificates during the secure boot phase.

Involvement of third-party vendors

A researcher at security firm ESET identified that at least seven vendors were using a signed firmware component known as “reloader.efi” insecurely. These vendors included Howyar Technologies, Greenware, Radix, Sanfong, WASAY, CES, and SignalComputer. They all released updates following the discovery to mitigate the risk associated with their system utilities.

By utilizing a custom executable loader, these utilities could inadvertently bypass Microsoft’s security checks, allowing the execution of any firmware code, including unsigned binaries that should have been blocked by secure boot protections. This vulnerability enabled sophisticated attackers to potentially attach malware to trusted utilities.

Response from Microsoft

Microsoft responded by revoking the digital certificates for the affected firmware versions, which aims to restrict hackers from exploiting this security hole. Despite the length of time the vulnerability persisted after ESET reported it to Microsoft in July 2024, there is no evidence indicating that hackers exploited the issue in actual attacks.

Microsoft has released an update to resolve CVE-2024-7344, and Windows 11 users are advised to ensure they have installed all relevant patches, particularly from the January 14th Patch Tuesday release.


Featured image credit: Sunrise King/Unsplash

Tags: cybersecurityfeaturedMicrosoftwindows 11
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking. With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create. As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

Apple begins iPhone 18 series production testing in January

Apple begins iPhone 18 series production testing in January

24 December 2025
EA investigates AI claims in Battlefield 6 cosmetics

EA investigates AI claims in Battlefield 6 cosmetics

24 December 2025
Amazon Alexa+ will book your hotels and salons starting in 2026

Amazon Alexa+ will book your hotels and salons starting in 2026

24 December 2025
OpenAI launches Skills in Codex

OpenAI launches Skills in Codex

24 December 2025

LATEST

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

How to connect a PS4 controller to Steam via USB or Bluetooth

How to connect your phone to Wi-Fi and fix connection issues

Apple begins iPhone 18 series production testing in January

EA investigates AI claims in Battlefield 6 cosmetics

Amazon Alexa+ will book your hotels and salons starting in 2026

OpenAI launches Skills in Codex

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska