First published: Tue Oct 18 2022(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-21620.
The vulnerability affects the Oracle VM VirtualBox product of Oracle Virtualization.
The vulnerability affects the Core component of the Oracle VM VirtualBox product.
Versions prior to 6.1.40 of the Oracle VM VirtualBox product are affected.
The severity of CVE-2022-21620 is high with a severity value of 7.5.
The vulnerability allows a high privileged attacker with logon access to the infrastructure where Oracle VM VirtualBox executes to compromise the system.
Yes, upgrading to version 6.1.40 or later of the Oracle VM VirtualBox product fixes the vulnerability.
You can find more information about CVE-2022-21620 on the following websites: [Gentoo Security Advisory](https://security.gentoo.org/glsa/202212-03) and [Oracle Security Alerts](https://www.oracle.com/security-alerts/cpuoct2022.html).