Monday, April 28, 2025
HomeCVE/vulnerabilityParallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

Published on

SIEM as a Service

Follow Us on Google News

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling attackers to escalate privileges to the root level on macOS systems.

The proof-of-concept (PoC) exploit code demonstrates two distinct bypass methods that circumvent existing patches for CVE-2024-34331, a previously addressed privilege escalation flaw.

Technical Overview of the Vulnerability

Bypassing Parallels Desktop Patch Verification

- Advertisement - Google News

The patched CVE-2024-34331 vulnerability involved improper signature verification of the createinstallmedia tool used during macOS installer repackaging.

Parallels’ initial fix required Apple-signed binaries for privilege escalation. However, the newly disclosed bypasses exploit weaknesses in this verification logic:

1. TOCTOU (Time-of-Check to Time-of-Use) Race Condition
Attackers replace the verified createinstallmedia binary with a malicious payload during the brief interval between signature validation and execution.

The exploit script below demonstrates this technique:

#!/bin/sh

# [...] payload creation

defaults write /tmp/poc.app/Contents/Info.plist CFBundleDisplayName createinstallmedia

open /tmp/poc.app -a /Applications/Parallels\ Desktop.app

# [...] directory monitoring loop replaces binary post-validation

mv /tmp/payload /tmp/poc.app/Contents/Resources/createinstallmedia

2. Weak Signature Requirement Exploit
The signature check uses the overly permissive anchor apple rule, allowing any Apple-signed binary (e.g., /bin/ls) to pass verification.

Attackers inject malicious code via dynamic library (DYLIB) hijacking into legitimate Apple binaries.

Evolution of the Vulnerability Chain

Post-Patch Bypass in Version 19.4.1

Parallels introduced a new do_repack_manual function in version 19.4.1 to handle installer repackaging via 7z compression:

do_repack_manual() {

    # [...] path manipulation vulnerability

    local result_vol_name="$(defaults read "$source_app"/Contents/Info CFBundleDisplayName)"

    temp_result_dir="$temp_dir"/"$result_vol_name"

    mkdir "$temp_result_dir"

    # [...] attacker-controlled path leads to arbitrary code execution

    cp -R "$source_app" "$temp_result_dir"

}

Attackers exploit path traversal in the CFBundleDisplayName value to overwrite the 7z binary used by Parallels, as shown in the second exploit script:

defaults write /tmp/poc.app/Contents/Info.plist CFBundleDisplayName ../../../../../../tmp/lnk/result

# [...] symlink manipulation redirects root-owned directories

ln -s /tmp/redirect /tmp/lnk

ln -sfn /tmp/dst /tmp/lnk

Unresolved Vendor Response Timeline

The researcher reported the bypass to Zero Day Initiative (ZDI) on May 31, 2024, but received delayed confirmation due to version discrepancy issues. 

Despite Parallels releasing incremental updates, the core privilege escalation risk remains unaddressed, with the following critical impacts:

  • Full root access via trivial path manipulation
  • Silent code execution bypassing macOS transparency mechanisms
  • Weaponization potential in supply chain attacks targeting macOS virtualization users

Mitigation Recommendations

Until Parallels issues an official patch, users should:

  1. Restrict Parallels Desktop Privileges:
    Disable automatic execution via prl_disp_service using macOS Privacy Controls under System Settings > Security > Automation.
  2. Audit ISO/DMG Sources:
    Only process installer images from verified Apple distribution channels.
  3. Monitor File System Activity:
    Implement endpoint detection for unexpected writes to /Library/ or modifications to Parallels’ resources directory.

This disclosure underscores the persistent risks in privileged virtualization services and the critical need for robust signature validation frameworks.

Users and enterprises relying on Parallels Desktop for macOS virtualization should treat this as an active threat until vendors release comprehensive fixes.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...