This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Desktop Control Agent service. The service loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Access |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15787 is classified as a local privilege escalation vulnerability.
To address ZDI-CAN-15787, ensure that you apply the latest patches provided by Parallels for the Access Agent.
ZDI-CAN-15787 affects local users of the Parallels Access Agent software on targeted systems.
Local attackers who have access to execute low-privileged code on the affected system can exploit ZDI-CAN-15787.
ZDI-CAN-15787 is a local privilege escalation vulnerability that allows attackers to gain higher privileges on the system.