Oracle VM VirtualBox Vulnerability Allows Low Privileged Attackers to Compromise Virtual Machine

CVE-2024-21111
7.8HIGH

Key Information

Vendor
Oracle
Status
Vm Virtualbox
Vendor
CVE Published:
16 April 2024

Badges

πŸ˜„ TrendedπŸ‘Ύ Exploit ExistsπŸ”΄ Public PoCπŸ“° News Worthy

Summary

The vulnerability CVE-2024-21111 in Oracle VM VirtualBox allows low privileged attackers to compromise the virtual machine. The vulnerability, with a severity of 7.8, permits a low privileged attacker with logon access to the infrastructure to take over the Oracle VM VirtualBox, but only applies to Windows hosts. Exploitation of this vulnerability could result in the compromise of Oracle VM VirtualBox. A Proof-of-Concept (PoC) exploit has been released, detailing how a threat actor can escalate privileges and perform symbolic link attacks. Users are advised to upgrade to the latest version of Oracle VM VirtualBox to prevent exploitation of this vulnerability. No known exploitation by ransomware groups has been reported.

Affected Version(s)

VM VirtualBox < 7.0.16

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ‘Ύ

    Exploit exists.

  • Vulnerability started trending.

  • First article discovered by GBHackers on Security

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)3 News Article(s)
.