Parallel Desktops has disclosed two serious privilege escalation vulnerabilities in Parallels desktops application. The First vulnerability, CVE-2021-34987 is a HDAudio buffer overflow local privilege escalation vulnerability that allows local attackers to escalate privileges on malicious installations of Parallels Desktops. The Second one is CVE-2021-34986 is a Time-of-Check Time-of-Use privilege escalation vulnerability that allows attackers to escalate privileges on the affected installation of Parallels Desktop. These vulnerabilities allow attackers to escalate privileges and execute arbitrary code in the context of hypervisor and root, respectively. There is a need to fix these vulnerabilities. In this post, let’s see how to fix these privilege escalation vulnerabilities in Parallels Desktop- CVE-2021-34987 & CVE-2021-34986.
Parallels Desktop is a fast, easy, and powerful application for running Windows on Mac without a reboot. It allows you to run thousands of Windows applications like Internet Explorer, Microsoft Office, Quicken, Access, etc., without compromising the performance.
The vulnerability CVE-2021-34987 allows a local administrator to escalate privileges on the target system. It exists because the application does not impose security restrictions within the HDAudio virtual device, leading to privilege escalation and security restrictions bypass.
Associated CVE ID | CVE-2021-34987 |
Description | A Local Privilege Escalation Vulnerability in Parallel Desktop |
Associated ZDI ID | ZDI-CAN-14969 |
CVSS Score | 8.2 High |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | High |
User Interaction (UI) | None |
Scope | Changed |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
The vulnerability CVE-2021-34986 allows a local user to escalate privileges on the target system. It exists due to the Time-of-check Time-of-use condition within the Parallels desktop. A user can create a symbolic link, abuse service to execute a file, and gain escalated privileges on the system.
Associated CVE ID | CVE-2021-44731 |
Description | A Local Privilege Escalation Vulnerability in Parallel Desktop |
Associated ZDI ID | ZDI-CAN-13932 |
CVSS Score | 7.8 High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Impact Score | |
Exploitability Score | |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
Parallels Desktop versions before 17.1.0 51516 are affected by CVE-2021-34987 and CVE-2021-34986 privilege escalation vulnerabilities. Make sure that your mac should have the Parallel Desktop equal to or above the v17.1.0 51516.
Install Parallels Desktop updates to maintain your Parallels Desktop product’s security. Click on the Parallels Desktop menu on the Mac menu bar and check for updates. If there is an update available, you will see the option to download and install it.
The table shows the security update for the version that needs to be fixed.
Name or ID | Fixed in Version | Release Date |
ZDI-CAN-14969ZDI-CAN-13932 | 17.1.0 (51516) | October 14, 2021 |
How to configure Parallels Desktop to automatically check for updates?
It is too simple and easy to update the Parallel Desktops applications on Mac. Just follow these steps to configure auto-update.
Step 1. Go to Parallels Desktop menu > Preferences > General
Step 2. Verify that the ‘Download updates automatically’ check-box is checked
Step 3. Schedule how often the updates are needed to check
Click here for more security updates for Parallels Desktop vulnerabilities.
We hope this post helps you know How to Fix These Privilege Escalation Vulnerabilities in Parallel Desktop- CVE-2021-34987 & CVE-2021-34986. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How To Fix The Polkit Privilege Escalation Vulnerability (CVE-2021-4034)
What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?
How To Fix CVE-2022-0492- Privilege Escalation And Container Escape Vulnerabilities In Cgroups
How To Fix The Dirty Pipe Vulnerability In Linux Kernel- CVE-2022-0847
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.