PT-2023-7981 · Parallels · Parallels Desktop
Kn32
·
Published
2023-06-21
·
Updated
2024-09-18
·
CVE-2023-50226
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Parallels Desktop (affected versions not specified)
Description
This issue allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this issue. The specific flaw exists within the Updater service, where an attacker can abuse the service to move arbitrary files by creating a symbolic link. This can be leveraged to escalate privileges and execute arbitrary code in the context of root.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this issue.
Exploit
Fix
Link Following
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Parallels Desktop