This local privilege escalation vulnerability in iTunes could spell big trouble for Windows users


Cyfirma Research recently discovered a serious security vulnerability affecting users of iTunes on Windows systems.
This local privilege escalation vulnerability, classified as CVE-2024-44193, allows attackers with limited access to elevate their privileges, potentially compromising entire systems.
The vulnerability, present in iTunes for Windows version 12.13.2.3 and earlier, poses a critical threat to the security of systems, making timely updates and patching essential.
Urgent iTunes update addresses this escalation risk
The core issue behind CVE-2024-44193 lies in improper permission management, specifically related to the AppleMobileDeviceService.exe.
Attackers can exploit the CVE-2024-44193 vulnerability by manipulating the files within the C:\ProgramData\Apple\Lockdown directory. With inadequate permission settings, even low-privileged users can write arbitrary files to this directory, enabling attackers to create opportunities for privilege escalation.
This vulnerability is not difficult to trigger, and thus makes its exploitation particularly concerning, as attackers can use various tools, such as NTFS junctions and opportunistic locks, to craft sophisticated exploit chains resulting in the execution of arbitrary code with elevated privileges.
The exploitation of CVE-2024-44193 follows a structured sequence of steps, allowing attackers to manipulate the AppleMobileDeviceService.exe and gain elevated privileges. First, attackers create arbitrary files within the Lockdown directory, leveraging tools like Oplock to halt processes at key moments. They can then exploit NTFS junctions, which redirect file deletions to critical system areas.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
These actions culminate in the deletion of essential system files, giving the attacker administrative access. The ease of exploitation, combined with the widespread use of iTunes, particularly in enterprise environments, increases the vulnerability’s risk profile. Organizations are urged to update iTunes to version 12.13.3 or later to mitigate the risk.
The impact of this vulnerability is severe, as it grants attackers administrative-level access to the targeted system. With SYSTEM-level privileges, attackers can manipulate system files, install malware, access sensitive data, and even disrupt services. This makes CVE-2024-44193 a critical risk for organizations, particularly those with large numbers of unmanaged or outdated systems running vulnerable versions of iTunes.
At the moment, there is no confirmed evidence of this vulnerability being actively exploited in the wild and there is also no active discussion of this vulnerability in underground forums. However, its potential for widespread use remains high due to the low complexity of the attack.
CVE-2024-44193 affects iTunes for Windows globally, impacting a variety of industries that rely on Windows-based systems. Media and entertainment, education, government, and corporate environments are particularly vulnerable due to the widespread use of iTunes. Additionally, organizations handling sensitive data or operating in high-risk environments may face increased exposure to attacks.
More from TechRadar Pro
Cyfirma Research recently discovered a serious security vulnerability affecting users of iTunes on Windows systems. This local privilege escalation vulnerability, classified as CVE-2024-44193, allows attackers with limited access to elevate their privileges, potentially compromising entire systems. The vulnerability, present in iTunes for Windows version 12.13.2.3 and earlier, poses a critical…
Recent Posts
- Everything new on Apple TV+ in March 2025: Severance season 2 finale, Dope Thief, The Studio, and more
- Powerplay 2: Logitech made its magic mousepad cheaper instead of better
- Is your business primed to respond to downtime?
- AT&T Promo Code: Get a Gift Card Worth Up to $200
- Top digital loan firm security slip-up puts data of 36 million users at risk
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010