First published: Fri Jul 15 2022(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop 17.1.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the update machanism. The product sets incorrect permissions on sensitive files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16395.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Parallels Desktop | =17.1.1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34891 is a vulnerability in Parallels Desktop that allows local attackers to escalate privileges on affected installations.
The vulnerability requires an attacker to execute low-privileged code on the target system to exploit it.
The severity of CVE-2022-34891 is high with a CVSS score of 7.8.
To mitigate the vulnerability, update Parallels Desktop to version 17.1.1 or apply the necessary patches provided by the vendor.
For more information about CVE-2022-34891, you can refer to the following references: [KB article](https://kb.parallels.com/125013) and [ZDI advisory](https://www.zerodayinitiative.com/advisories/ZDI-22-942/).