This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access Agent. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. The service executes files from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Access |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-16137 is rated as critical due to its potential for local privilege escalation.
To fix ZDI-CAN-16137, update the Parallels Access Agent to the latest version provided by the vendor.
ZDI-CAN-16137 affects installations of Parallels Access Agent on systems where local attackers can execute low-privileged code.
Exploiting ZDI-CAN-16137 allows attackers to escalate their privileges on the target host system.
If you are vulnerable to ZDI-CAN-16137, immediately apply the recommended updates and review your system for any signs of exploitation.