CVE-2022-34891
📋 TL;DR
CVE-2022-34891 is a local privilege escalation vulnerability in Parallels Desktop where incorrect file permissions allow attackers to escalate to root privileges. Attackers must first gain local code execution with low privileges to exploit this flaw. This affects Parallels Desktop users on macOS systems.
💻 Affected Systems
- Parallels Desktop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level arbitrary code execution, allowing full control over the host macOS system and all virtual machines.
Likely Case
Local attackers gaining root privileges to install persistent malware, access sensitive data, or pivot to other systems.
If Mitigated
Limited impact if proper access controls prevent local code execution or if systems are isolated from untrusted users.
🎯 Exploit Status
Exploitation requires local access but is straightforward once low-privileged code execution is achieved. The vulnerability is in the update mechanism's file permission handling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Parallels Desktop 17.1.2 and later
Vendor Advisory: https://kb.parallels.com/125013
Restart Required: Yes
Instructions:
1. Open Parallels Desktop. 2. Go to Help > Check for Updates. 3. Install version 17.1.2 or later. 4. Restart your Mac to complete the update.
🔧 Temporary Workarounds
Restrict local user access
allLimit local user accounts to trusted individuals only and implement strict access controls.
Disable Parallels Desktop if not needed
macosUninstall or disable Parallels Desktop on systems where virtualization is not required.
sudo /Applications/Parallels\ Desktop.app/Contents/MacOS/uninstall
🧯 If You Can't Patch
- Implement strict user access controls and monitor for suspicious local activity
- Isolate affected systems from critical networks and implement application whitelisting
🔍 How to Verify
Check if Vulnerable:
Check Parallels Desktop version in the application (Help > About Parallels Desktop). If version is 17.1.1 or earlier, the system is vulnerable.
Check Version:
/Applications/Parallels\ Desktop.app/Contents/MacOS/prlsrvctl -V
Verify Fix Applied:
Verify the version is 17.1.2 or later in Help > About Parallels Desktop after updating.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized privilege escalation attempts, unexpected root-level process execution, modifications to Parallels Desktop files
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
Search for process execution events where parent process is Parallels Desktop-related and child process runs as root unexpectedly.