Parallels Desktop Technical Data Reporter Link Following Local Privilege Escalation Vulnerability.
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.
The specific flaw exists within the Technical Data Reporter component. By creating a symbolic link, an attacker can abuse the service to change the permissions of arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-25014.
References
Link | Resource |
---|---|
https://kb.parallels.com/130212 | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-25-082/ | Third Party Advisory |
Configurations
History
15 Aug 2025, 12:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Parallels
Parallels remote Application Server Parallels parallels |
|
CPE | cpe:2.3:a:parallels:remote_application_server:*:*:*:*:*:*:*:* cpe:2.3:a:parallels:parallels:*:*:*:*:*:windows:*:* |
|
Summary |
|
|
References | () https://kb.parallels.com/130212 - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-082/ - Third Party Advisory |
05 Feb 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-05 00:15
Updated : 2025-08-15 12:45
NVD link : CVE-2025-0413
Mitre link : CVE-2025-0413
CVE.ORG link : CVE-2025-0413
JSON object : View
Products Affected
parallels
- remote_application_server
- parallels
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')