NA

CVE-2023-50226

Published: 03/05/2024 Updated: 03/05/2024

Vulnerability Summary

Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21227.

Vulnerability Trend

Github Repositories

Parallels Desktop privilege escalation - CVE-2023-50226 / ZDI-CAN-21227

parallels-file-move-privesc This repository contains an exploit for CVE-2023-50226 / ZDI-CAN-21227, which can be used to escalate privileges to root using Parallels Desktop on versions before 1832

Parallels Desktop privilege escalation - CVE-2023-50226 / ZDI-CAN-21227

parallels-file-move-privesc This repository contains an exploit for CVE-2023-50226 / ZDI-CAN-21227, which can be used to escalate privileges to root using Parallels Desktop on versions before 1832