Vulnerability Details : CVE-2021-2264
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 8.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N).
Vulnerability category: Bypass
Products affected by CVE-2021-2264
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-2264
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-2264
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:P/I:P/A:N |
3.9
|
4.9
|
NIST | |
8.4
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N |
2.0
|
5.8
|
Oracle |
References for CVE-2021-2264
-
https://security.gentoo.org/glsa/202208-36
Oracle VirtualBox: Multiple Vulnerabilities (GLSA 202208-36) — Gentoo securityThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/04/26/1
oss-security - virtualbox: CVE-2021-2264: vboxautostart-service.sh allows injection of parameters in 'su' invocationExploit;Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2021/04/26/2
oss-security - virtualbox: CVE-2021-25319: missing sticky bit in openSUSE packaging for /etc/box allows local root exploit for members of vboxusers groupExploit;Mailing List;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpuapr2021.html
Oracle Critical Patch Update Advisory - April 2021Patch;Vendor Advisory
Jump to