CVE-2025-61759

6.5 MEDIUM

📋 TL;DR

A local privilege escalation vulnerability in Oracle VM VirtualBox allows authenticated attackers with low privileges on the host system to access sensitive data from VirtualBox. This affects VirtualBox versions 7.1.12 and 7.2.2. The vulnerability can impact other products running on the same infrastructure due to scope change.

💻 Affected Systems

Products:
  • Oracle VM VirtualBox
Versions: 7.1.12 and 7.2.2
Operating Systems: All platforms where VirtualBox runs (Windows, Linux, macOS, Solaris)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Core component. Requires attacker to have logon access to the infrastructure where VirtualBox executes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all VirtualBox-accessible data including virtual machine configurations, disk images, and sensitive host information, potentially leading to lateral movement to other systems.

🟠

Likely Case

Unauthorized access to virtual machine data, configuration files, and potentially sensitive information stored within VirtualBox-managed resources.

🟢

If Mitigated

Limited impact if proper access controls and network segmentation are implemented, restricting low-privileged users from accessing VirtualBox infrastructure.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring attacker access to the host system where VirtualBox runs.
🏢 Internal Only: HIGH - Internal users with low-privileged access to VirtualBox hosts can exploit this to access sensitive virtualization data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates 'easily exploitable' with low attack complexity. Requires local access with low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for October 2025 for specific fixed versions

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2025.html

Restart Required: Yes

Instructions:

1. Review Oracle October 2025 Critical Patch Update advisory. 2. Download and install the latest VirtualBox version. 3. Restart VirtualBox services and affected virtual machines.

🔧 Temporary Workarounds

Restrict VirtualBox Host Access

all

Limit user access to systems running VirtualBox to only authorized administrators

Network Segmentation

all

Isolate VirtualBox hosts from general user networks

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can log into VirtualBox host systems
  • Monitor VirtualBox host systems for unusual access patterns or data exfiltration attempts

🔍 How to Verify

Check if Vulnerable:

Check VirtualBox version: On host system, run 'VBoxManage --version' or check About in VirtualBox GUI

Check Version:

VBoxManage --version

Verify Fix Applied:

Verify installed version is newer than 7.1.12 and 7.2.2 by checking version against Oracle's patched versions in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to VirtualBox configuration files
  • Failed privilege escalation attempts on VirtualBox host
  • Access to VirtualBox data directories by non-admin users

Network Indicators:

  • Unexpected data transfers from VirtualBox host systems

SIEM Query:

source="VirtualBox" AND (event_type="access_denied" OR user!="admin" AND action="config_access")

🔗 References

📤 Share & Export