First published: Wed Jan 19 2022(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21295 is low with a severity value of 3.8.
The version affected by CVE-2022-21295 is prior to 6.1.32.
The vulnerability in Oracle VM VirtualBox is an easily exploitable vulnerability that allows a low privileged attacker with logon access to compromise the system.
To fix CVE-2022-21295, it is recommended to update Oracle VM VirtualBox to version 6.1.32 or later.
More information about CVE-2022-21295 can be found on the Oracle Security Alerts website: [https://www.oracle.com/security-alerts/cpujan2022.html](https://www.oracle.com/security-alerts/cpujan2022.html)