All versions of Parallels Desktop, including the most recent 20.2.1 (55876), are vulnerable to the flaw identified as CVE-2024-34331, which results from insufficient security controls in the application’s macOS installer repackaging subsystem. Until Parallels releases an official patch, system administrators should weigh the operational necessity of Parallels Desktop against potential security risks in enterprise environments. Mitigation requires immediate removal of SUID permissions from Parallels tools, network segmentation of Parallels Desktop systems and monitoring for unauthorized /Library/lpe file creation. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This bypass leverages macOS’s code signing design to subvert Parallels’ security checks while maintaining legitimate Apple signatures. Jin’s first PoC (exploit1.sh) demonstrates this by creating a fake macOS installer bundle with /bin/ls masquerading as createinstallmedia, and triggering Parallels’ repackaging workflow. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 24 Feb 2025 08:00:15 +0000