CVE-2024-34331

9.8 CRITICAL

📋 TL;DR

This vulnerability in Parallels Desktop for Mac allows attackers to escalate privileges to root by exploiting a lack of code signature verification in the Parallels Service, which runs with setuid root permissions. It affects users of Parallels Desktop for Mac versions 19.3.0 and below, enabling unauthorized access and control over the system.

💻 Affected Systems

Products:
  • Parallels Desktop for Mac
Versions: 19.3.0 and below
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Parallels Desktop is installed and the Parallels Service is active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full root access to the macOS host, allowing them to install malware, steal data, or compromise the entire system.

🟠

Likely Case

Local attackers or malware with user-level access escalate privileges to root, leading to persistent control and further exploitation.

🟢

If Mitigated

With proper patching and security controls, the risk is minimized, though residual risk exists if unpatched.

🌐 Internet-Facing: LOW, as exploitation typically requires local access or malware execution on the host.
🏢 Internal Only: HIGH, due to the potential for privilege escalation by malicious insiders or compromised user accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to run code on the target system; public proof-of-concept details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.3.1 or later

Vendor Advisory: https://kb.parallels.com/129860

Restart Required: Yes

Instructions:

1. Open Parallels Desktop. 2. Go to 'Check for Updates' in the menu. 3. Install the update to version 19.3.1 or higher. 4. Restart the system as prompted.

🔧 Temporary Workarounds

Disable Parallels Service setuid

macOS

Remove setuid permissions from the Parallels Service binary to prevent privilege escalation.

sudo chmod u-s /Applications/Parallels\ Desktop.app/Contents/MacOS/Parallels\ Service

🧯 If You Can't Patch

  • Restrict local access to the system and monitor for suspicious activity.
  • Consider temporarily disabling or uninstalling Parallels Desktop if not essential.

🔍 How to Verify

Check if Vulnerable:

Check the Parallels Desktop version in the application or run: ls -l /Applications/Parallels\ Desktop.app/Contents/MacOS/Parallels\ Service to see if setuid is set.

Check Version:

/Applications/Parallels\ Desktop.app/Contents/MacOS/prlctl --version

Verify Fix Applied:

Verify the version is 19.3.1 or later in Parallels Desktop settings or via command: /Applications/Parallels\ Desktop.app/Contents/MacOS/prlctl --version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual root privilege escalations or modifications to Parallels Service files in system logs.

Network Indicators:

  • None specific, as this is a local privilege escalation vulnerability.

SIEM Query:

Example: search for 'Parallels Service' AND 'setuid' in macOS audit logs or process execution events.

🔗 References

📤 Share & Export