First published: Wed Jul 15 2020(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Guest Additions toolset. The issue results from the use of unnecessary privileges when performing service operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | ||
Oracle VirtualBox | <5.2.44 | |
Oracle VirtualBox | >=6.0.0<6.0.24 | |
Oracle VirtualBox | >=6.1.0<6.1.12 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14628 has a high severity level due to its potential for privilege escalation on vulnerable Oracle VirtualBox installations.
To fix CVE-2020-14628, update your Oracle VirtualBox to the latest version to mitigate the vulnerability.
CVE-2020-14628 affects Oracle VirtualBox versions up to 5.2.44 and certain versions between 6.0.0 and 6.0.24, as well as 6.1.0 to 6.1.12.
No, CVE-2020-14628 requires local access to the system to exploit the privilege escalation vulnerability.
The potential impacts of CVE-2020-14628 include unauthorized system access and control, allowing attackers to execute sensitive operations.