CVE-2022-34889
📋 TL;DR
This vulnerability in Parallels Desktop allows local attackers with high-privileged code execution on a guest VM to escalate privileges to hypervisor level through a buffer read overflow in the ACPI virtual device. It affects Parallels Desktop installations where untrusted users can run code on guest systems. The flaw enables arbitrary code execution in the hypervisor context.
💻 Affected Systems
- Parallels Desktop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the host system through hypervisor escape, allowing attacker to execute arbitrary code with highest privileges, access all VMs, and potentially persist across reboots.
Likely Case
Privilege escalation from guest VM administrator to hypervisor level, enabling lateral movement to other VMs and host system compromise.
If Mitigated
Limited to guest VM isolation breach if proper network segmentation and least privilege are enforced on guest systems.
🎯 Exploit Status
Requires existing high-privileged code execution on guest VM. Exploit involves crafting malicious ACPI requests to trigger buffer overflow.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 17.1.1 (51548) or later
Vendor Advisory: https://kb.parallels.com/125013
Restart Required: Yes
Instructions:
1. Open Parallels Desktop. 2. Go to Help > Check for Updates. 3. Install update 17.1.1 (51548) or later. 4. Restart all running VMs and Parallels Desktop.
🔧 Temporary Workarounds
Disable ACPI for non-essential VMs
allRemove ACPI virtual device from VMs that don't require power management features
Parallels Desktop: VM Configuration > Hardware > Remove ACPI device
Restrict guest VM privileges
allLimit administrative access on guest VMs to reduce attack surface
🧯 If You Can't Patch
- Isolate vulnerable Parallels Desktop hosts from critical networks
- Monitor for suspicious hypervisor activity and guest VM privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check Parallels Desktop version: In Parallels Desktop, go to About Parallels Desktop. If version is 17.1.1 (51537) or earlier, system is vulnerable.
Check Version:
On macOS host: /usr/libexec/PlistBuddy -c 'Print :CFBundleShortVersionString' /Applications/Parallels\ Desktop.app/Contents/Info.plist
Verify Fix Applied:
Verify version is 17.1.1 (51548) or later in About Parallels Desktop. Test ACPI functionality in VMs remains operational.
📡 Detection & Monitoring
Log Indicators:
- Unexpected ACPI device errors in guest VM logs
- Hypervisor crash logs or unexpected restarts
- Guest VM attempting privileged hypervisor operations
Network Indicators:
- Unusual network traffic from host to other VMs post-exploit
- Guest VM communicating with hypervisor management interfaces
SIEM Query:
source="parallels.log" AND ("ACPI error" OR "buffer overflow" OR "privilege escalation")