Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Published: 2026-01-20
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The reported vulnerability exists in the core component of Oracle® VM VirtualBox. It allows an attacker who already has logon access to the host system and holds high privileges to take control of the virtualization software. Successful exploitation results in full compromise of Confidentiality, Integrity, and Availability for the VirtualBox instance and may lead to a scope change that also affects other components on the host. The weakness corresponds to improper authorization or privilege escalation, providing the attacker with equivalent or greater authority than the original user.

Affected Systems

This issue affects Oracle Corporation’s Oracle® VM VirtualBox versions 7.1.14 and 7.2.4. These releases are part of the Oracle Virtualization product line used to run virtual machines on physical hardware.

Risk and Exploitability

The severity as expressed by the CVSS base score of 8.2 indicates a high-impact vulnerability. However, the EPSS score is reported as less than 1%, implying a very low likelihood that the vulnerability is actively exploited in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, which further reduces the immediate threat level. Because the attack vector is local and requires high privileged access to the host system, the likelihood of exploitation is limited to environments with weak local access controls. The risk to affected systems therefore remains moderate, driven mainly by the high potential impact rather than prevalent exploitation.

Generated by OpenCVE AI on April 18, 2026 at 04:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Oracle VM VirtualBox to a version that includes the vendor’s security fix, such as the latest release available for the 7.x series.
  • Restrict local access to the host machine where VirtualBox runs, ensuring only trusted administrators have logon rights and monitoring for anomalous activity.
  • If an update is not immediately available, consider disabling VirtualBox or isolating the host from external networks until the vulnerability can be remediated.

Generated by OpenCVE AI on April 18, 2026 at 04:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation in Oracle VM VirtualBox 7.x
Weaknesses CWE-269
CWE-284

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
First Time appeared Oracle
Oracle vm Virtualbox
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.1.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:7.2.4:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle vm Virtualbox
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Oracle Vm Virtualbox
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-02-26T14:44:36.012Z

Reserved: 2026-01-05T18:07:34.717Z

Link: CVE-2026-21990

cve-icon Vulnrichment

Updated: 2026-01-29T16:30:34.177Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T22:16:02.590

Modified: 2026-01-29T16:00:32.770

Link: CVE-2026-21990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:30:35Z