A lack of code signature verification in Parallels Desktop for Mac v19.3.0 and below allows attackers to escalate privileges via a crafted macOS installer, because Parallels Service is setuid root.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Parallels
Parallels parallels Desktop |
|
Weaknesses | CWE-269 | |
CPEs | cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:macos:*:* | |
Vendors & Products |
Parallels
Parallels parallels Desktop |
|
Metrics |
cvssV3_1
|
Mon, 23 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A lack of code signature verification in Parallels Desktop for Mac v19.3.0 and below allows attackers to escalate privileges via a crafted macOS installer, because Parallels Service is setuid root. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-23T00:00:00
Updated: 2024-09-23T16:15:56.922Z
Reserved: 2024-05-02T00:00:00
Link: CVE-2024-34331
Vulnrichment
Updated: 2024-09-23T16:15:35.797Z
NVD
Status : Awaiting Analysis
Published: 2024-09-23T16:15:05.400
Modified: 2024-09-26T13:32:55.343
Link: CVE-2024-34331
Redhat
No data.