{"id":59851,"date":"2025-08-03T15:42:47","date_gmt":"2025-08-03T15:42:47","guid":{"rendered":""},"modified":"2025-10-02T00:14:34","modified_gmt":"2025-10-02T06:14:34","slug":"cve-2024-54189-privilege-escalation-vulnerability-in-parallels-desktop-for-mac-snapshot-functionality","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-54189-privilege-escalation-vulnerability-in-parallels-desktop-for-mac-snapshot-functionality\/","title":{"rendered":"<strong>CVE-2024-54189: Privilege Escalation Vulnerability in Parallels Desktop for Mac Snapshot Functionality<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The newly discovered vulnerability CVE-2024-54189 exposes a significant risk for users of Parallels Desktop for Mac version 20.1.1 (build 55740). This vulnerability lies within the Snapshot functionality of the software and has the potential to allow an attacker to escalate privileges, potentially leading to a full system compromise or data leakage. This risk is particularly pertinent for corporate environments relying on the virtualization capabilities of Parallels Desktop for Mac, as it could potentially provide an attacker with access to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50105-critical-vulnerability-in-oracle-universal-work-queue-allowing-unauthorized-data-access\/\"  data-wpil-monitor-id=\"69158\">critical systems or sensitive data<\/a>.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-54189<br \/>\nSeverity: High (7.8 CVSS Score)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70415\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1278667178\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-52561-privilege-escalation-vulnerability-in-parallels-desktop-for-mac\/\"  data-wpil-monitor-id=\"69296\">Parallels Desktop<\/a> for Mac | version 20.1.1 (build 55740)<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit takes advantage of a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7695-privilege-escalation-vulnerability-in-dataverse-integration-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"69157\">privilege escalation vulnerability<\/a> in the Snapshot functionality of Parallels Desktop for Mac. When a snapshot of a virtual machine is taken, a root service <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-40738-critical-arbitrary-file-write-vulnerability-in-sinec-nms\/\"  data-wpil-monitor-id=\"66590\">writes to a file<\/a> owned by a regular user. An attacker, by creating a hard link to an <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6058-critical-arbitrary-file-upload-vulnerability-in-wpbookit-wordpress-plugin\/\"  data-wpil-monitor-id=\"66591\">arbitrary file<\/a>, can trick the root service into writing to this other file, leading to potential privilege escalation. This means any user with low-level access could potentially gain high-level or root <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36600-dell-bios-improper-access-control-vulnerability-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"70416\">access to the system<\/a>.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2752478056\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following pseudocode demonstrates how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-7457-macos-authorization-model-exploit-leading-to-potential-mitm-attacks\/\"  data-wpil-monitor-id=\"80114\">exploit could potentially<\/a> be implemented:<\/p>\n<pre><code class=\"\" data-line=\"\"># Create a hard link to a file you want to overwrite\nln \/path\/to\/important\/file \/path\/to\/your\/controlled\/file\n# Trigger the snapshot functionality\nparallels --take-snapshot VM_ID\n# The root service will now write to your controlled file, overwriting the important file<\/code><\/pre>\n<p>Please note that this is a conceptual example and may not work verbatim. The actual exploit would depend on various other factors, including the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43192-critical-configuration-issue-in-macos-allowing-potential-system-compromise\/\"  data-wpil-monitor-id=\"80115\">system&#8217;s configuration<\/a> and the attacker&#8217;s privileges.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>Users are strongly advised to apply the vendor-supplied patch to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-58280-object-heap-address-exposure-vulnerability-in-ark-ets\/\"  data-wpil-monitor-id=\"87268\">address this vulnerability<\/a>. If the patch cannot be applied immediately, using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can serve as a temporary mitigation strategy. Regular <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6791-sql-injection-vulnerability-in-centreon-web-monitoring-event-logs-module\/\"  data-wpil-monitor-id=\"84104\">monitoring and logging<\/a> of system activity can also help in early detection and prevention of potential exploits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The newly discovered vulnerability CVE-2024-54189 exposes a significant risk for users of Parallels Desktop for Mac version 20.1.1 (build 55740). This vulnerability lies within the Snapshot functionality of the software and has the potential to allow an attacker to escalate privileges, potentially leading to a full system compromise or data leakage. This risk is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[76],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59851","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-privilege-escalation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59851"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59851\/revisions"}],"predecessor-version":[{"id":80111,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59851\/revisions\/80111"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59851"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59851"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59851"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59851"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59851"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59851"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}