Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
Published: 2026-01-20
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access due to privilege escalation
Action: Apply Vendor Patch
AI Analysis

Impact

This vulnerability arises from improper privilege management within Oracle VM VirtualBox’s core component. A local attacker who has high‑privileged access on the host machine can exploit the flaw to gain unauthorized control of the VirtualBox service. The outcome is a breach of confidentiality, allowing the attacker to read or manipulate any data accessible through VirtualBox. The weakness corresponds to CWE‑269, reflecting the failure to enforce appropriate privilege levels.

Affected Systems

The affected product is Oracle Corporation’s Oracle VM VirtualBox, versions 7.1.14 and 7.2.4. These releases are listed by Oracle as vulnerable. The described impact may extend to additional products or services that run on the same host, though the scope change is not limited to VirtualBox alone.

Risk and Exploitability

Risk assessment shows a CVSS 3.1 base score of 6.0, indicating moderate severity but significant confidentiality impact. The EPSS score is below 1%, implying a low current exploitation probability. Because the vulnerability requires local high‑privileged access and is not listed in the KeV catalog, the threat is primarily to environments where hosts are not hardened against privileged local attackers. The attacker must first compromise or have access to the host; once there, executing a crafted operation within VirtualBox provides complete access to all data exposed by the virtual machine service.

Generated by OpenCVE AI on April 18, 2026 at 04:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Oracle VM VirtualBox to a patched release that closes the privilege‑management flaw.
  • Enforce least privilege on accounts that can launch or manage VirtualBox; restrict high‑privileged access to trusted users only.
  • Isolate the VirtualBox host from sensitive network segments to limit potential data exposure if the service is compromised.

Generated by OpenCVE AI on April 18, 2026 at 04:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Title High-Privilege Data Access via Oracle VM VirtualBox Vulnerability

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.1.4:*:*:*:*:*:*:*

Wed, 21 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
First Time appeared Oracle
Oracle vm Virtualbox
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.1.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:7.2.4:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle vm Virtualbox
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Oracle Vm Virtualbox
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-01-21T15:49:37.439Z

Reserved: 2026-01-05T18:07:34.714Z

Link: CVE-2026-21963

cve-icon Vulnrichment

Updated: 2026-01-21T15:48:31.175Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T22:15:59.230

Modified: 2026-01-29T16:01:09.270

Link: CVE-2026-21963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:30:35Z

Weaknesses