First published: Fri May 03 2024(Updated: )
Parallels Desktop Updater Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-18150.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27323 has a medium severity rating, indicating a significant risk if exploited.
To mitigate CVE-2023-27323, ensure that you have installed the latest updates for Parallels Desktop provided by the vendor.
CVE-2023-27323 can allow local attackers to escalate their privileges, potentially leading to unauthorized access or control over the system.
CVE-2023-27323 affects users running specific versions of Parallels Desktop for Mac.
An attacker must first execute low-privileged code on the affected system to exploit CVE-2023-27323.