A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.
History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Jun 2025 11:30:00 +0000


Tue, 03 Jun 2025 10:00:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.
Weaknesses CWE-62
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2025-06-03T09:43:27.168Z

Updated: 2025-06-03T13:19:52.966Z

Reserved: 2024-12-05T15:34:29.663Z

Link: CVE-2024-54189

cve-icon Vulnrichment

Updated: 2025-06-03T11:03:07.503Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-03T10:15:22.040

Modified: 2025-06-04T14:54:33.783

Link: CVE-2024-54189

cve-icon Redhat

No data.