Parallels Desktop Updater Improper Verification of Cryptographic Signature Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.
The specific flaw exists within the Updater service. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
. Was ZDI-CAN-21817.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Parallels
Parallels parallels Desktop |
|
CPEs | cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:* | |
Vendors & Products |
Parallels
Parallels parallels Desktop |
|
Metrics |
ssvc
|
Wed, 18 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Parallels Desktop Updater Improper Verification of Cryptographic Signature Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21817. | Parallels Desktop Updater Improper Verification of Cryptographic Signature Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-21817. |
MITRE
Status: PUBLISHED
Assigner: zdi
Published: 2024-05-03T02:14:45.884Z
Updated: 2024-09-18T18:30:37.643Z
Reserved: 2023-12-05T16:15:17.544Z
Link: CVE-2023-50228
Vulnrichment
Updated: 2024-08-02T22:09:49.714Z
NVD
Status : Awaiting Analysis
Published: 2024-05-03T03:16:11.507
Modified: 2024-11-21T08:36:42.487
Link: CVE-2023-50228
Redhat
No data.