Parallels Desktop Technical Data Reporter Link Following Local Privilege Escalation Vulnerability.
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.
The specific flaw exists within the Technical Data Reporter component. By creating a symbolic link, an attacker can abuse the service to change the permissions of arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-25014.
References
Link | Resource |
---|---|
https://kb.parallels.com/130212 | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-25-082/ | Third Party Advisory |
Configurations
History
15 Aug 2025, 12:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.parallels.com/130212 - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-082/ - Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:parallels:parallels:*:*:*:*:*:windows:*:* cpe:2.3:a:parallels:remote_application_server:*:*:*:*:*:*:*:* |
|
First Time |
Parallels remote Application Server
Parallels parallels Parallels |
05 Feb 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-05 00:15
Updated : 2025-08-15 12:45
NVD link : CVE-2025-0413
Mitre link : CVE-2025-0413
CVE.ORG link : CVE-2025-0413
JSON object : View
Products Affected
parallels
- parallels
- remote_application_server
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')