| CVE ID | CVE-2020-17393 |
| CVSS SCORE | 6.5, AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
| AFFECTED VENDORS |
Parallels |
| AFFECTED PRODUCTS |
Desktop |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the prl_hypervisor kext. The issue results from the lack of proper validation of user-supplied data, which can result a pointer to be leaked after the handler is done. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. |
| ADDITIONAL DETAILS |
Parallels has issued an update to correct this vulnerability. More details can be found at:
https://kb.parallels.com/en/125013 |
| DISCLOSURE TIMELINE |
|
| CREDIT | Reno Robert of Trend Micro Zero Day Initiative |