Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
Published: 2026-01-20
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Compromise via Local Privileged Attacker
Action: Immediate Patch
AI Analysis

Impact

A bug in the core component of Oracle VM VirtualBox allows a high‑privileged attacker who has logged onto the host infrastructure to compromise the VirtualBox installation. The resulting compromise can provide unauthorized access to critical data, leading to confidentiality loss. Based on the CVSS vector, the attack requires a local presence on the host and high privileges; it does not require network‑based exploitation or user interaction, but it does rely on the attacker already having local logon capabilities. The vulnerability can potentially affect other products through scope changes, amplifying its impact.

Affected Systems

Oracle VM VirtualBox 7.1.14 and 7.2.4, delivered by Oracle Corporation.

Risk and Exploitability

The CVSS base score of 6.0 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation at this time. Although the vulnerability is not listed in CISA’s KEV catalog, the fact that it requires high local privileges and provides confidentiality impacts means that it should still be considered a serious risk in environments where VirtualBox runs with elevated rights. The scope change possibility means that a successful local exploit could also jeopardize other systems that are dependent on the compromised VirtualBox instance.

Generated by OpenCVE AI on April 18, 2026 at 15:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official Oracle update that addresses the VirtualBox 7.1.14 and 7.2.4 vulnerability.
  • Limit local administrative and logon privileges on hosts running VirtualBox, ensuring only trusted users have high‑privilege access.
  • Configure auditing and monitoring on the host to detect anomalous activity related to VirtualBox processes.

Generated by OpenCVE AI on April 18, 2026 at 15:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Title Local Privileged Escalation in Oracle VM VirtualBox Core Component

Thu, 29 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
First Time appeared Oracle
Oracle vm Virtualbox
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.1.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:7.2.4:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle vm Virtualbox
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Oracle Vm Virtualbox
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-01-23T21:55:15.535Z

Reserved: 2026-01-05T18:07:34.717Z

Link: CVE-2026-21985

cve-icon Vulnrichment

Updated: 2026-01-23T18:56:56.630Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T22:16:02.000

Modified: 2026-01-29T14:40:06.553

Link: CVE-2026-21985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:45:04Z

Weaknesses