Specialists in a cyber security course report finding multiple vulnerabilities in Parallels Desktop, software that provides hardware virtualization for Mac computers with Intel processors. Successful exploitation of these flaws would allow access to sensitive information, scale privileges on the target system, and more.
Below are brief descriptions of the reported flaws, in addition to their respective identification keys and scores according to the Common Vulnerability Scoring System (CVSS).
CVE-2020-17402: An error within kext prl_hypervisor would allow local users access to sensitive information on the affected system. The flaw received a score of 3.3/10.
CVE-2020-17401: A boundary condition within the VGA virtual appliance would allow local users to trigger an error to access the contents of system memory. This vulnerability received a score of 2.8/10.
CVE-2020-17400: A boundary condition within the kext prl_hypervisor would allow a remote threat actor to execute a read error and trigger an escalation of privileges on the affected system, the specialists of a cyber security course mention.
The flaw received a score of 7.7/10.
CVE-2020-17399: A boundary error processing an unverified entry in kext would prl_hypervisor allow on-premises users to scale privileges on the system. This vulnerability received a score of 7.7/10.
CVE-2020-17398: A boundary condition within kext would prl_hypervisor allow local users to access sensitive information. The vulnerability received a score of 3.3/10.
CVE-2020-17397: A boundary condition within network packet handling would allow on-premises users to scale privileges on the target system.
This flaw received a score of 6.5/10.
CVE-2020-17396: An integer overflow within the module would prl_hypervisor allow on-premises users to scale privileges on the target system. The vulnerability received a score of 7.7/10.
CVE-2020-17395: An integer overflow within the process would prl_naptd allow on-premises users to scale privileges on the target system. This vulnerability received a score of 6.5/10, the cyber security course specialists mention.
CVE-2020-17394: A boundary condition within the OEMNet component would allow local users to run a specially designed program to trigger a read error and access the contents of memory. The vulnerability received a score of 2.8/10.
CVE-2020-17392: An unverified pointer dereference error when handling HOST_IOCTL_SET_KERNEL_SYMBOLS in kext would prl_hypervisor allow local users to run a specially designed program and execute arbitrary code in the context of the kernel, allowing for privilege escalation.
This flaw received a score of 7.7/10.
CVE-2020-17391: An error in HOST_IOCTL_INIT_HYPERVISOR handling in kext prl_hypervisor would allow local threat actors to gain unauthorized access to sensitive information on the system. The vulnerability received a score of 3.3/10.
Flaws reside in the following versions of Parallels Desktop: 15.0.0 (46967), 15.1.0 (47107), 15.1.1 (47117), 15.1.2 (47123), 15.1.3, 15.1.3 (47255), and 15.1.4 (47270).
Experts have not yet detected attempts to exploit these flaws, although users of exposed Parallels Desktop versions should update as soon as possible. Most of these vulnerabilities require local access, so the risk of exploitation is significantly reduced.