CVE-2023-50228
📋 TL;DR
This vulnerability in Parallels Desktop Updater allows local attackers to escalate privileges from low-privileged code execution to root-level access due to improper cryptographic signature verification. It affects Parallels Desktop installations where an attacker already has initial access to the system. The vulnerability enables arbitrary code execution with root privileges.
💻 Affected Systems
- Parallels Desktop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level persistence, data exfiltration, and lateral movement capabilities.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install malware, or access protected resources.
If Mitigated
Limited impact if proper patch management and least privilege principles are enforced.
🎯 Exploit Status
Requires local code execution first, but privilege escalation component is straightforward once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 19.1.1 or later
Vendor Advisory: https://kb.parallels.com/en/125013
Restart Required: Yes
Instructions:
1. Open Parallels Desktop. 2. Go to Parallels Desktop menu > Check for Updates. 3. Install version 19.1.1 or later. 4. Restart the system.
🔧 Temporary Workarounds
Disable Parallels Desktop Updater Service
allTemporarily disable the vulnerable Updater service to prevent exploitation
sudo launchctl unload /Library/LaunchDaemons/com.parallels.desktop.launchdaemon.plist
🧯 If You Can't Patch
- Restrict local user privileges using macOS System Preferences to limit initial attack surface
- Implement application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check Parallels Desktop version: Open Parallels Desktop > About Parallels Desktop. If version is earlier than 19.1.1, system is vulnerable.
Check Version:
defaults read /Applications/Parallels\ Desktop.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify version is 19.1.1 or later in About Parallels Desktop dialog.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation attempts in system logs
- Suspicious Updater service activity
Network Indicators:
- None - local privilege escalation only
SIEM Query:
process_name:"Parallels Desktop Updater" AND parent_process NOT IN (expected_parent_processes)