Headline
CVE-2021-34986: ZDI-22-385
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932.
February 18th, 2022
Parallels Desktop Service Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability****ZDI-22-385
ZDI-CAN-13932
CVE ID
CVE-2021-34986
CVSS SCORE
7.8, (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS
Parallels
AFFECTED PRODUCTS
Desktop
VULNERABILITY DETAILS
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
ADDITIONAL DETAILS
Parallels has issued an update to correct this vulnerability. More details can be found at:
https://kb.parallels.com/en/125013
DISCLOSURE TIMELINE
- 2021-07-09 - Vulnerability reported to vendor
- 2022-02-18 - Coordinated public release of advisory
CREDIT
say2
BACK TO ADVISORIES
Related news
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.