This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Guest Additions toolset. The issue results from the use of unnecessary privileges when performing service operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-886 is considered high due to the potential for local privilege escalation.
To fix ZDI-20-886, ensure that you update Oracle VirtualBox to the latest version as recommended in the security patches.
ZDI-20-886 affects installations of Oracle VirtualBox where local attackers can execute low-privileged code.
Local users with low privileges on affected systems are at risk of exploiting ZDI-20-886 to escalate their privileges.
Exploitation of ZDI-20-886 could allow an attacker to gain elevated privileges, potentially compromising the entire system.