
Cloud Vulnerability DB
A community-led vulnerabilities database
Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability affects Parallels Desktop installations. The vulnerability was discovered and disclosed through the Zero Day Initiative program (ZDI-CAN-21227). It impacts versions up to 17.1.7(51588) and versions from 18.0.0(53049) up to 18.3.2_(53621) (Zero Day Initiative).
The vulnerability exists within the Updater service of Parallels Desktop. The specific flaw allows attackers to abuse the service by creating a symbolic link to move arbitrary files. The vulnerability has received a CVSS v3.0 Base Score of 7.8 (HIGH) with the vector string CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The weakness is classified as CWE-59: Improper Link Resolution Before File Access ('Link Following') (Zero Day Initiative).
A successful exploitation of this vulnerability allows attackers to escalate privileges and execute arbitrary code in the context of root. This means an attacker could gain complete control over the affected system with the highest possible privileges (Zero Day Initiative).
Parallels has addressed this vulnerability in their security advisory. Users are advised to update to the latest version of Parallels Desktop that contains the fix (Parallels KB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."