First published: Tue Apr 18 2023(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <6.1.44 | |
Oracle VM VirtualBox | >=7.0.0<7.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Oracle VM VirtualBox vulnerability is CVE-2023-21998.
The severity of CVE-2023-21998 is medium.
Versions prior to 6.1.44 and versions prior to 7.0.8 of Oracle VM VirtualBox are affected by CVE-2023-21998.
CVE-2023-21998 allows a high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox is installed to exploit the vulnerability easily.
You can find more information about CVE-2023-21998 on the official Oracle Security Alerts page at https://www.oracle.com/security-alerts/cpuapr2023.html.