First published: Mon Jul 18 2022(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Desktop Control Agent service. The service loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-15787.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Parallels Access | =6.5.4_\(39316\) | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-34902.
The title of this vulnerability is Parallels Access Agent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability.
The affected software is Parallels Access 6.5.4 (39316) Agent.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The severity of this vulnerability is high with a CVSS score of 7.8.