First published: Fri Jun 21 2024(Updated: )
Improper privilege management vulnerability in Parallels Desktop Software, which affects versions earlier than 19.3.0. An attacker could add malicious code in a script and populate the BASH_ENV environment variable with the path to the malicious script, executing on application startup. An attacker could exploit this vulnerability to escalate privileges on the system.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Desktop for Mac | <19.3.0 |
The vulnerability has been fixed by the manufacturer Parallels in version 19.3.0.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6240 is rated as a high severity vulnerability due to improper privilege management that can lead to the execution of malicious code.
To fix CVE-2024-6240, upgrade Parallels Desktop to version 19.3.0 or later.
CVE-2024-6240 affects all versions of Parallels Desktop prior to 19.3.0.
CVE-2024-6240 is classified as an improper privilege management vulnerability.
Yes, CVE-2024-6240 could potentially allow an attacker to execute arbitrary code on the affected system.