{ "schema_version": "1.4.0", "id": "GHSA-2wx8-vvfc-5r8w", "modified": "2024-05-03T03:30:47Z", "published": "2024-05-03T03:30:47Z", "aliases": [ "CVE-2023-27323" ], "details": "Parallels Desktop Updater Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-18150.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27323" }, { "type": "WEB", "url": "https://kb.parallels.com/125013" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-217" } ], "database_specific": { "cwe_ids": [ "CWE-367" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-03T02:15:08Z" } }