First published: Tue Feb 04 2025(Updated: )
Parallels Desktop Technical Data Reporter Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Technical Data Reporter component. By creating a symbolic link, an attacker can abuse the service to change the permissions of arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-25014.
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Desktop for Mac | ||
Parallels Desktop for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0413 has a high severity rating due to its potential to allow local privilege escalation.
To fix CVE-2025-0413, update your Parallels Desktop to the latest version that addresses this vulnerability.
CVE-2025-0413 affects users of Parallels Desktop for Mac who have not applied the necessary updates.
CVE-2025-0413 is a local privilege escalation vulnerability that can be exploited by low-privileged users.
No, CVE-2025-0413 requires local access to the system for exploitation.