Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
Published: 2026-04-21
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Partial Denial of Service
Action: Patch
AI Analysis

Impact

This vulnerability exists in the core component of Oracle VM VirtualBox version 7.2.6. It permits an attacker who has logged onto the host system with a high‑privileged account to trigger a partial denial of service of the VirtualBox service without requiring user interaction. The flaw causes an availability degradation, does not affect confidentiality or integrity, and is rooted in improper access control (CWE‑284).

Affected Systems

Oracle VM VirtualBox version 7.2.6 is the only documented affected product; no other releases or components are listed.

Risk and Exploitability

The CVSS v3.1 Base Score of 2.3 indicates low severity, while the EPSS score of <1% reflects an extremely low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a local attacker with high‑privilege access to the host, which confines the threat to environments where such accounts exist. Though the risk is low, the availability impact can disrupt operations and warrants timely remediation.

Generated by OpenCVE AI on April 28, 2026 at 21:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Oracle VM VirtualBox to a patched version that resolves the denial‑of‑service issue.
  • Restrict the use of high‑privileged accounts on hosts that run VirtualBox, applying the principle of least privilege.
  • If VirtualBox is not required to run dynamically, consider disabling or sandboxing the VirtualBox service to reduce the attack surface.

Generated by OpenCVE AI on April 28, 2026 at 21:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Title Local Privileged Attacker Causes Partial Denial of Service in Oracle VM VirtualBox 7.2.6

Tue, 28 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 06:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
First Time appeared Oracle
Oracle vm Virtualbox
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.2.6:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle vm Virtualbox
References
Metrics cvssV3_1

{'score': 2.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Oracle Vm Virtualbox
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-04-22T15:32:09.463Z

Reserved: 2026-04-01T20:03:40.834Z

Link: CVE-2026-35250

cve-icon Vulnrichment

Updated: 2026-04-22T15:20:43.855Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T21:16:41.280

Modified: 2026-04-23T12:59:07.163

Link: CVE-2026-35250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T21:30:26Z

Weaknesses