Impact
Vulnerability in the Core component of Oracle VM VirtualBox allows a high-privileged local attacker to compromise the software. A single successful exploit can lead to full takeover with confidentiality, integrity, and availability impact for the virtualized environment. The CVSS vector indicates a local attack with low AC, high privilege and unchanged UI, but a changed scope that may affect additional products.
Affected Systems
Oracle works through its VirtualBox product line. Versions 7.1.14 and 7.2.4 are confirmed to be affected. Users running these releases are at risk until a patch or newer release is applied.
Risk and Exploitability
The CVSS base score of 8.2 classifies this flaw as high risk. EPSS is below 1% and it is not listed in the CISA KEV catalog, suggesting exploitation probability remains low at present. However, because the vulnerability requires local access with high privileges, any compromised host or insider attacker can immediately exercise this flaw, potentially allowing full control of the virtualization stack. The impact extends beyond Oracle VM VirtualBox due to the scope change, potentially affecting other products dependent on or integrated with the virtual environment.
OpenCVE Enrichment