April 6, 2023, 4:08 p.m. | Reno Robert

Zero Day Initiative - Blog www.zerodayinitiative.com

In the last few years, we have seen multiple vulnerabilities in Parallels Desktop leading to virtual machine escapes. Interested readers can check our previous blog posts about vulnerabilities across interfaces such as RDPMC hypercalls, the Parallels ToolGate, and the VGA virtual device. This post explores another set of issues we received last year - local privilege escalations through setuid root binaries.


Parallels Desktop has a couple of setuid binaries: prl_update_helper and Parallels Service. Both binaries run with …

bash blog blog post blog posts check desktop device handling local machine macos mode parallels privilege privileged privileges root run scripts service setuid vga virtual virtual machine vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom