This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932.
References
Link Resource
https://kb.parallels.com/en/125013 Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-22-385/ Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: zdi

Published: 2022-07-15T19:05:14

Updated: 2022-07-15T19:05:14

Reserved: 2021-06-17T00:00:00


Link: CVE-2021-34986

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-07-15T19:15:08.290

Modified: 2022-07-22T14:01:25.817


Link: CVE-2021-34986

JSON object: View

cve-icon Redhat Information

No data.

CWE