CVE-2024-13944

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers on Windows systems running Norton Utilities Ultimate to escalate privileges to SYSTEM level by exploiting a symbolic link race condition. Attackers can execute arbitrary code with highest privileges after gaining initial access. Only users of specific Norton Utilities Ultimate versions on Windows 10 Pro x64 are affected.

💻 Affected Systems

Products:
  • Norton Utilities Ultimate
Versions: 24.2.16862.6344
Operating Systems: Windows 10 Pro x64
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. NortonUtilitiesSvc service must be running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and disabling of security controls.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, enabling lateral movement, persistence establishment, and data exfiltration.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and application control are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access (via phishing, malware, etc.), they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to create symbolic links. TOCTTOU attacks require precise timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest patched version

Vendor Advisory: https://www.gendigital.com/us/en/contact-us/security-advisories/

Restart Required: Yes

Instructions:

1. Open Norton Utilities Ultimate. 2. Check for updates in settings. 3. Install available updates. 4. Restart system if prompted.

🔧 Temporary Workarounds

Disable NortonUtilitiesSvc Service

windows

Temporarily disable the vulnerable service to prevent exploitation

sc config NortonUtilitiesSvc start= disabled
sc stop NortonUtilitiesSvc

Restrict Symbolic Link Creation

windows

Configure Windows to restrict who can create symbolic links

secedit /export /cfg config.inf
Edit config.inf to set 'Create symbolic links' to Administrators only
secedit /configure /db config.sdb /cfg config.inf

🧯 If You Can't Patch

  • Implement strict least privilege - ensure users run with minimal necessary permissions
  • Deploy application control/whitelisting to prevent unauthorized process execution

🔍 How to Verify

Check if Vulnerable:

Check Norton Utilities Ultimate version in program settings or via 'wmic product get name,version' for version 24.2.16862.6344

Check Version:

wmic product where "name like 'Norton Utilities%'" get name,version

Verify Fix Applied:

Verify Norton Utilities Ultimate version is updated beyond 24.2.16862.6344 and check service is running patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual NortonUtilitiesSvc service activity
  • Multiple symbolic link creation attempts
  • Process creation from NortonUtilitiesSvc with SYSTEM privileges

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

EventID=4688 AND NewProcessName='*NortonUtilitiesSvc*' AND SubjectUserName!='SYSTEM'

🔗 References

📤 Share & Export