Impact
A local attacker who can log on to the infrastructure hosting Oracle VM VirtualBox can trigger a crash of the VirtualBox process, causing the virtual machine to hang or repeatedly crash. The flaw does not disclose data or enable code execution, but it can bring the virtual machine to a complete denial of service. The vulnerability resides in the Core component of Oracle VM VirtualBox and has been demonstrated to impact Windows‑based virtual machines.
Affected Systems
Oracle VM VirtualBox versions 7.1.14 and 7.2.4 are affected. These versions are released by Oracle Corporation for use on Windows hosts that run Windows virtual machines.
Risk and Exploitability
The vulnerability carries a CVSS v3.1 score of 7.1, indicating high severity. EPSS shows a very low exploitation probability (<1%). It is not listed in the CISA KEV catalog. Although the attack vector is local (logon to the infrastructure), an attacker with local access can easily trigger the failure, meaning that in environments where the VirtualBox host is accessible to untrusted users, the risk is significant. Because the impact is a denial of service, the effect is limited to availability rather than confidentiality or integrity.
OpenCVE Enrichment