Products
Parallels Desktop for Mac
- up to 19.3.0
Source
cve@mitre.org
Tags
CVE-2024-34331 details
Published : Sept. 23, 2024, 4:15 p.m.
Last Modified : Sept. 23, 2024, 5:35 p.m.
Last Modified : Sept. 23, 2024, 5:35 p.m.
Description
A lack of code signature verification in Parallels Desktop for Mac v19.3.0 and below allows attackers to escalate privileges via a crafted macOS installer, because Parallels Service is setuid root.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-269 | Improper Privilege Management | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
3.9
Impact Score
5.9
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://kb.parallels.com/129860 | cve@mitre.org |
https://khronokernel.com/macos/2024/05/30/CVE-2024-34331.html | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.