First published: Tue Jan 17 2023(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.42 and prior to 7.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: Applies to VirtualBox VMs running Windows 7 and later. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.42 | |
Oracle VM VirtualBox | >=7.0.0<7.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-21898.
The severity of CVE-2023-21898 is medium with a severity score of 5.5.
Versions prior to 6.1.42 and prior to 7.0.6 of Oracle VM VirtualBox are affected by this vulnerability.
An attacker with low privileges and access to the infrastructure where Oracle VM VirtualBox is installed can easily exploit CVE-2023-21898.
Yes, a fix is available. Users should update their Oracle VM VirtualBox software to version 6.1.42 or later if using a version prior to 6.1.42, and version 7.0.6 or later if using a version prior to 7.0.6.