Advisory Details

November 25th, 2025

Parallels Toolbox CleanDrive Link Following Local Privilege Escalation Vulnerability

ZDI-25-1015
ZDI-CAN-26516

CVE ID
CVSS SCORE 7.3, AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Parallels
AFFECTED PRODUCTS Toolbox
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Toolbox. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. Additional user interaction is required in that an administrator must begin a cleanup of temporary files on the system.

The specific flaw exists within the CleanDrive service. By creating a symbolic link, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS

Fixed in Parallels Toolbox for Windows versions 7.1.1


DISCLOSURE TIMELINE
  • 2025-03-19 - Vulnerability reported to vendor
  • 2025-11-25 - Coordinated public release of advisory
  • 2025-11-25 - Advisory Updated
CREDIT Zeze with TeamT5
BACK TO ADVISORIES