First published: Tue Jul 18 2023(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | >=6.0.0<6.1.46 | |
Oracle VM VirtualBox | >=7.0.0<7.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Oracle VM VirtualBox vulnerability is CVE-2023-22016.
The affected component of this Oracle VM VirtualBox vulnerability is Core.
The versions of Oracle VM VirtualBox affected by this vulnerability are prior to 6.1.46 and prior to 7.0.10.
Yes, this vulnerability is easily exploitable.
The severity level of this Oracle VM VirtualBox vulnerability is medium (4).
You can find more information about this Oracle VM VirtualBox vulnerability at the following link: [Oracle Security Alerts - July 2023](https://www.oracle.com/security-alerts/cpujul2023.html)