First published: Wed Jan 19 2022(Updated: )
This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the implementation of the TFTP server. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the hypervisor.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.32 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21394 is a vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization that allows a low privileged attacker to compromise the host system by exploiting a directory traversal issue in the TFTP server.
The severity of CVE-2022-21394 vulnerability is medium with a CVSS base score of 6.5.
The Oracle VirtualBox software versions prior to 6.1.32 are affected by CVE-2022-21394 vulnerability.
A low privileged attacker with logon access to the infrastructure where Oracle VM VirtualBox executes can exploit the CVE-2022-21394 vulnerability by leveraging the directory traversal issue in the TFTP server.
Yes, upgrading to Oracle VM VirtualBox version 6.1.32 or later will resolve the CVE-2022-21394 vulnerability.