Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54643 | A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation. |
Wed, 02 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parallels
Parallels parallels Desktop |
|
| Weaknesses | CWE-59 | |
| CPEs | cpe:2.3:a:parallels:parallels_desktop:20.1.1_\(55740\):*:*:*:*:macos:*:* | |
| Vendors & Products |
Parallels
Parallels parallels Desktop |
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Jun 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation. | |
| Weaknesses | CWE-62 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-06-03T13:22:13.518Z
Reserved: 2024-12-09T19:55:30.980Z
Link: CVE-2024-36486
Updated: 2025-06-03T11:03:05.592Z
Status : Analyzed
Published: 2025-06-03T10:15:20.657
Modified: 2025-07-02T15:06:56.410
Link: CVE-2024-36486
No data.
OpenCVE Enrichment
No data.
EUVD