Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54642 | A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation. |
Wed, 02 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Parallels
Parallels parallels Desktop |
|
| Weaknesses | CWE-59 | |
| CPEs | cpe:2.3:a:parallels:parallels_desktop:20.1.1_\(55740\):*:*:*:*:macos:*:* | |
| Vendors & Products |
Parallels
Parallels parallels Desktop |
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Jun 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation. | |
| Weaknesses | CWE-62 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-06-03T13:19:52.966Z
Reserved: 2024-12-05T15:34:29.663Z
Link: CVE-2024-54189
Updated: 2025-06-03T11:03:07.503Z
Status : Analyzed
Published: 2025-06-03T10:15:22.040
Modified: 2025-07-02T14:49:41.983
Link: CVE-2024-54189
No data.
OpenCVE Enrichment
No data.
EUVD