CWE-62

UNIX Hard Link

2 CVEs Avg CVSS 7.8 MITRE
0
CRITICAL
2
HIGH
0
MEDIUM
0
LOW
2
POC
0
KEV

Monthly

CVE-2024-54189 HIGH POC This Week

Privilege escalation vulnerability in Parallels Desktop for Mac version 20.1.1 (build 55740) where the snapshot functionality allows a local attacker with user-level privileges to write arbitrary files via hard link exploitation of a root-owned process. An attacker can leverage this to escalate privileges from a normal user to root, potentially achieving full system compromise. The vulnerability has a CVSS score of 7.8 (high severity) and requires local access with low complexity.

Privilege Escalation Parallels Desktop
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2024-36486 HIGH POC This Week

Privilege escalation vulnerability in Parallels Desktop for Mac 20.1.1 that allows a local attacker with user-level privileges to gain root-level code execution through a hard link attack during virtual machine archive restoration. The prl_vmarchiver tool operates with root privileges during decompression and file restoration, enabling an attacker to redirect writes to arbitrary system files. This vulnerability has a CVSS score of 7.8 (High) with low attack complexity, making it a practical privilege escalation vector for local users on affected systems.

Privilege Escalation Parallels Desktop
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2024-54189
EPSS 0% CVSS 7.8
HIGH POC This Week

Privilege escalation vulnerability in Parallels Desktop for Mac version 20.1.1 (build 55740) where the snapshot functionality allows a local attacker with user-level privileges to write arbitrary files via hard link exploitation of a root-owned process. An attacker can leverage this to escalate privileges from a normal user to root, potentially achieving full system compromise. The vulnerability has a CVSS score of 7.8 (high severity) and requires local access with low complexity.

Privilege Escalation Parallels Desktop
NVD
CVE-2024-36486
EPSS 0% CVSS 7.8
HIGH POC This Week

Privilege escalation vulnerability in Parallels Desktop for Mac 20.1.1 that allows a local attacker with user-level privileges to gain root-level code execution through a hard link attack during virtual machine archive restoration. The prl_vmarchiver tool operates with root privileges during decompression and file restoration, enabling an attacker to redirect writes to arbitrary system files. This vulnerability has a CVSS score of 7.8 (High) with low attack complexity, making it a practical privilege escalation vector for local users on affected systems.

Privilege Escalation Parallels Desktop
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy