First published: Wed Jul 15 2020(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VirtualBox | <5.2.44 | |
Oracle VirtualBox | >=6.0.0<6.0.24 | |
Oracle VirtualBox | >=6.1.0<6.1.12 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14712 is considered an easily exploitable vulnerability that could allow a low privileged attacker to gain access to the Oracle VM VirtualBox infrastructure.
To mitigate CVE-2020-14712, upgrade Oracle VM VirtualBox to version 5.2.44, 6.0.24, or 6.1.12 or later.
Versions prior to 5.2.44, 6.0.24, and 6.1.12 of Oracle VM VirtualBox are affected by CVE-2020-14712.
CVE-2020-14712 requires an attacker to have low-level access to the infrastructure where Oracle VM VirtualBox is running, so it is not a remote exploit.
CVE-2020-14712 applies to Oracle VM VirtualBox installed on openSUSE Leap versions 15.1 and 15.2 as well as other affected versions of Oracle VM VirtualBox.