Parallels Desktop has some worrying security flaws for Mac users

A person at a laptop with a cybersecure lock symbol floating above it.
(Image credit: Shutterstock / laymanzoom)

  • A researcher claims a fix for an older Parallels Desktop flaw doesn't work properly
  • There are multiple ways to bypass it and gain access to the root device
  • The bypass works on the latest version of the tool

Parallels Desktop apparently has some worrying flaws which could put Mac users at serious risk attack. The flaws were first spotted in mid-2024, and after not being properly fixed, a researcher decided to publish working exploits.

Parallels Desktop is a virtualization software allowing Mac users to run Windows, Linux, and other operating systems alongside macOS without rebooting. It offers seamless integration, enabling users to switch between operating systems effortlessly, share files, and run Windows applications as if they were native Mac apps.

In May 2024, a researcher called Mykola Grymalyuk discovered the program did not have code signature verification, resulting in a privilege elevation flaw now tracked as CVE-2024-34331. After disclosing the findings to Parallels Desktop, the developers issued a fix in September of the same year. Soon after, another researcher - Mickey Jin - analyzed the patch and came to the conclusion that there are workarounds.

Microsoft 365

Jin then reached out to the company, and despite being given assurances that his research will be scrutinized, that never happened. Now, seven months later, to force their hand, Jin released two exploits.

"Given that the vendor has left this vulnerability unaddressed for over seven months—despite prior disclosure—I have chosen to publicly disclose this 0-day exploit," Jin said in his analysis. "My goal is to raise awareness and urge users to mitigate risks proactively, as attackers could leverage this flaw in the wild."

Jin found two ways to abuse the flaw. One is to perform a time-of-check to time-of-use (TOCTOU) attack to exploit a race condition between checking if 'createinstallmedia' is Apple-signed and executing it with root privileges. The second one is via the 'do_repack_manual' function, which seems to be vulnerable to arbitrary root-own file overwrites.

The TOCTOU attack works on the latest version of Parallels, Jin said. Older versions are vulnerable to different methods.

Via BleepingComputer

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
Security
Microsoft reveals more on a potentially major Apple macOS security flaw
Representational image of a cybercriminal
Microsoft discovers five potentially damaging attacks against its own software
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
An abstract image of a lock against a digital background, denoting cybersecurity.
Apple CPU security issue could let hackers steal user data from browsers
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
The best free firewall
Microsoft fixes Power Pages security flaw, tells users to be on their guard
Latest in Security
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Latest in News
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Pixel Buds Pro 2
Cleaned your Pixel Buds Pro 2 recently? If not, you might be getting worse sound
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list