Advisory Details

July 7th, 2025

Parallels Client Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

ZDI-25-473
ZDI-CAN-25039

CVE ID CVE-2025-6812
CVSS SCORE 7.3, AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Parallels
AFFECTED PRODUCTS Client
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Client. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the AppServer service. The service loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user.

ADDITIONAL DETAILS

Fixed in:
*Parallels Client (Windows) v20.2-25889
*Parallels RAS Core v19.4.3.2-25228 (Hotfix)
*Parallels Client (Windows) v19.4.3-25221 (Hotfix)

Details can be found in https://kb.parallels.com/en/129018#section7 (version 19) and https://kb.parallels.com/en/130242 (version 20)


DISCLOSURE TIMELINE
  • 2024-10-15 - Vulnerability reported to vendor
  • 2025-07-07 - Coordinated public release of advisory
  • 2025-07-07 - Advisory Updated
CREDIT Kolja Grassmann (Neodyme)
BACK TO ADVISORIES