First published: Tue Oct 18 2022(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Oracle VM VirtualBox vulnerability is CVE-2022-39421.
The affected software for this Oracle VM VirtualBox vulnerability is Oracle VM VirtualBox version prior to 6.1.40.
The severity of CVE-2022-39421 is high, with a CVSS score of 7.3.
This vulnerability can be easily exploited by a low privileged attacker with logon access to the infrastructure where Oracle VM VirtualBox executes.
Yes, Oracle has released a fix for this vulnerability in version 6.1.40 of Oracle VM VirtualBox. It is recommended to update to this version to mitigate the risk.