CVE-2024-6153

Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-24-803/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*

History

25 Sep 2024, 14:44

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Parallels parallels Desktop
Parallels
CPE cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-24-803/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-803/ - Third Party Advisory, VDB Entry

20 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 20:15

Updated : 2024-09-25 14:44


NVD link : CVE-2024-6153

Mitre link : CVE-2024-6153


JSON object : View

Products Affected

parallels

  • parallels_desktop