First published: Wed Jul 15 2020(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14711 is applicable to macOS host only. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <5.2.44 | |
Oracle VM VirtualBox | >=6.0.0<6.0.24 | |
Oracle VM VirtualBox | >=6.1.0<6.1.12 | |
Apple iOS and macOS | ||
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14711 is considered an easily exploitable vulnerability that can allow high privileged attackers access to the infrastructure.
CVE-2020-14711 affects versions prior to 5.2.44, prior to 6.0.24, and prior to 6.1.12 of Oracle VM VirtualBox.
The recommended fix for CVE-2020-14711 is to upgrade Oracle VM VirtualBox to versions 5.2.44, 6.0.24, or 6.1.12 or later.
CVE-2020-14711 is not specific to operating systems, but it does affect Oracle VM VirtualBox installations on several environments.
The potential impacts of CVE-2020-14711 include unauthorized access and exploitation of the underlying infrastructure by a high privileged attacker.