CVE-2025-30074

7.8 HIGH

📋 TL;DR

This vulnerability in Parallels Desktop for macOS on Intel platforms allows local attackers to escalate privileges to root during VM creation. It affects users running vulnerable versions of Parallels Desktop on macOS with Intel processors. Successful exploitation gives attackers complete system control.

💻 Affected Systems

Products:
  • Parallels Desktop
Versions: Versions before 19.4.2 and 20.x before 20.2.2
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS systems with Intel processors; Apple Silicon (M1/M2) systems are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full root access to the macOS host system, enabling installation of persistent malware, data theft, and complete system compromise.

🟠

Likely Case

Malicious local user or malware with user-level access escalates to root to bypass security controls and maintain persistence.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated test environments or non-critical systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the system and ability to create or interact with VMs. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.4.2 or 20.2.2

Vendor Advisory: https://kb.parallels.com/en/130944

Restart Required: No

Instructions:

1. Open Parallels Desktop. 2. Go to Help > Check for Updates. 3. Install available update to version 19.4.2 or 20.2.2. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable VM Creation

macOS

Prevent users from creating new virtual machines to block the vulnerable routine

Restrict Parallels Desktop Usage

macOS

Limit Parallels Desktop to trusted users only via macOS permissions

🧯 If You Can't Patch

  • Remove Parallels Desktop from production systems
  • Isolate affected systems from critical network segments

🔍 How to Verify

Check if Vulnerable:

Check Parallels Desktop version in application menu or via 'prlctl --version' command

Check Version:

prlctl --version

Verify Fix Applied:

Confirm version is 19.4.2 or higher for version 19, or 20.2.2 or higher for version 20

📡 Detection & Monitoring

Log Indicators:

  • Unusual VM creation events
  • Privilege escalation attempts in system logs
  • Parallels Desktop crash reports

Network Indicators:

  • Unexpected network traffic from Parallels Desktop processes

SIEM Query:

source="parallels" AND (event="vm_create" OR event="privilege_escalation")

🔗 References

📤 Share & Export