Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-50226


Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to move arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-21227.


Published

2024-05-03T03:16:11.160

Last Modified

2025-08-08T18:43:26.993

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-59

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application parallels parallels_desktop < 17.1.7_\(51588\) Yes
Application parallels parallels_desktop < 18.3.2_\(53621\) Yes

References