Learn about CVE-2020-17392, a privilege escalation vulnerability in Parallels Desktop 15.1.3-47255, allowing local attackers to execute code in the kernel context. Find mitigation steps here.
A vulnerability in Parallels Desktop 15.1.3-47255 allows local attackers to escalate privileges by exploiting a flaw in the prl_hypervisor kext. This can lead to code execution in the kernel context.
Understanding CVE-2020-17392
This CVE involves a privilege escalation vulnerability in Parallels Desktop 15.1.3-47255.
What is CVE-2020-17392?
CVE-2020-17392 is a vulnerability that enables local attackers to elevate privileges on affected installations of Parallels Desktop 15.1.3-47255. The flaw exists in the handler for HOST_IOCTL_SET_KERNEL_SYMBOLS in the prl_hypervisor kext, resulting from inadequate validation of user-supplied values.
The Impact of CVE-2020-17392
The vulnerability has a CVSS base score of 8.8 (High severity) with a high impact on confidentiality, integrity, and availability. Attackers with low privileges can exploit this flaw to execute code in the kernel context.
Technical Details of CVE-2020-17392
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability stems from the lack of proper validation of a user-supplied value before dereferencing it as a pointer in the prl_hypervisor kext.
Affected Systems and Versions
Exploitation Mechanism
To exploit this vulnerability, an attacker must first execute low-privileged code on the target system. By leveraging the flaw in the prl_hypervisor kext, the attacker can escalate privileges and execute code in the kernel context.
Mitigation and Prevention
Protecting systems from CVE-2020-17392 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that Parallels Desktop is updated to the latest version to mitigate the CVE-2020-17392 vulnerability.