First published: Fri May 03 2024(Updated: )
Parallels Desktop Toolgate XML Injection Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of a user-supplied string before using it to construct an XML document. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-19187.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Desktop for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27328 has been rated as a high severity vulnerability due to its potential for local privilege escalation.
To remediate CVE-2023-27328, users should upgrade their Parallels Desktop software to the latest version that addresses this vulnerability.
CVE-2023-27328 involves an XML injection vulnerability that allows local attackers to escalate their privileges.
CVE-2023-27328 affects specific versions of Parallels Desktop for Mac; users should consult the vendor's documentation for details.
Local users with low privileges on systems running affected versions of Parallels Desktop for Mac are at risk from CVE-2023-27328.