
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in Oracle VM VirtualBox (CVE-2024-21141) affecting versions prior to 7.0.20. This vulnerability exists in the Core component of Oracle's virtualization product. The vulnerability was discovered by Khang Phan of Viettel Cyber Security (Oracle Advisory).
The vulnerability has been assigned a CVSS v3.1 Base Score of 8.2 (HIGH), with the following vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H. This indicates that while local access is required, the vulnerability has high impacts on confidentiality, integrity, and availability. The attack complexity is low, requiring high privileges but no user interaction (NVD).
Successful exploitation of this vulnerability can result in a complete takeover of Oracle VM VirtualBox. While the vulnerability is contained within VirtualBox, attacks may significantly impact additional products, indicating a potential for scope change (Oracle Advisory).
Oracle has released a security patch for this vulnerability in version 7.0.20 of VirtualBox. It is strongly recommended that customers apply this Critical Patch Update as soon as possible. Until the patch can be applied, limiting high-privileged access to the infrastructure where Oracle VM VirtualBox executes may help reduce the risk of successful attacks (Oracle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."