PT-2023-7981 · Parallels · Parallels Desktop

Kn32

·

Published

2023-06-21

·

Updated

2024-09-18

·

CVE-2023-50226

CVSS v3.1

7.8

High

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Parallels Desktop (affected versions not specified)
Description This issue allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this issue. The specific flaw exists within the Updater service, where an attacker can abuse the service to move arbitrary files by creating a symbolic link. This can be leveraged to escalate privileges and execute arbitrary code in the context of root.
Recommendations At the moment, there is no information about a newer version that contains a fix for this issue.

Exploit

Fix

Link Following

Weakness Enumeration

Related Identifiers

BDU:2023-09065
CVE-2023-50226
ZDI-23-1805

Affected Products

Parallels Desktop