Oracle VM VirtualBox Vulnerability Allows Low Privileged Attackers to Compromise Virtual Machine
Key Information
- Vendor
- Oracle
- Status
- Vm Virtualbox
- Vendor
- CVE Published:
- 16 April 2024
Badges
Summary
The vulnerability CVE-2024-21111 in Oracle VM VirtualBox allows low privileged attackers to compromise the virtual machine. The vulnerability, with a severity of 7.8, permits a low privileged attacker with logon access to the infrastructure to take over the Oracle VM VirtualBox, but only applies to Windows hosts. Exploitation of this vulnerability could result in the compromise of Oracle VM VirtualBox. A Proof-of-Concept (PoC) exploit has been released, detailing how a threat actor can escalate privileges and perform symbolic link attacks. Users are advised to upgrade to the latest version of Oracle VM VirtualBox to prevent exploitation of this vulnerability. No known exploitation by ransomware groups has been reported.
Affected Version(s)
VM VirtualBox < 7.0.16
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Threat Intel Roundup: Cisco, Virtualbox, SSLoad, V8 β Threat Radar Intelligence
admin April 23, 2024 No Comments Week in Overview(16 Apr-23 Apr) β 2024 Technical Summary Cisco...
7 months ago
PoC Exploit Released For Critical Oracle VirtualBox Vulnerability
Oracle Virtualbox was identified and reported with a critical vulnerability which was associated with Privilege Escalation and
7 months ago
CVSS V3.1
Timeline
- πΎ
Exploit exists.
Vulnerability started trending.
First article discovered by GBHackers on Security
Vulnerability published.