Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61760: Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

0
High
VulnerabilityCVE-2025-61760cvecve-2025-61760
Published: Tue Oct 21 2025 (10/21/2025, 20:03:12 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle VM VirtualBox

Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).

AI-Powered Analysis

AILast updated: 10/28/2025, 20:29:29 UTC

Technical Analysis

CVE-2025-61760 is a vulnerability identified in Oracle VM VirtualBox, specifically affecting versions 7.1.12 and 7.2.2. The flaw resides in the core component of the virtualization product and allows a low-privileged attacker who has logged onto the infrastructure where VirtualBox runs to potentially compromise the VirtualBox environment. Exploitation is considered difficult due to the requirement for high attack complexity and the necessity of user interaction from a person other than the attacker, such as tricking a user into performing an action that facilitates the attack. The vulnerability results in a scope change, meaning that although the initial compromise is within VirtualBox, the attack can impact additional products or systems running in conjunction with VirtualBox. The consequences of a successful exploit are severe, including full takeover of Oracle VM VirtualBox, which compromises confidentiality, integrity, and availability of the affected systems. The CVSS 3.1 base score is 7.5, reflecting high severity with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), user interaction required (UI:R), and scope changed (S:C). No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The underlying weakness relates to improper access control (CWE-284), indicating that the product fails to adequately restrict actions or access to privileged operations within the virtualization environment.

Potential Impact

For European organizations, the impact of CVE-2025-61760 can be significant, particularly for those relying on Oracle VM VirtualBox for virtualization infrastructure in data centers, development, or production environments. A successful compromise could allow attackers to gain control over the virtualization layer, potentially leading to unauthorized access to guest virtual machines, data leakage, or disruption of critical services. The scope change implies that other products integrated with or dependent on VirtualBox could also be affected, amplifying the risk. This could impact sectors such as finance, healthcare, government, and critical infrastructure where virtualization is heavily used. The requirement for local access and user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with multiple users or less stringent access controls. Additionally, the high confidentiality, integrity, and availability impacts mean that data breaches, service outages, or manipulation of virtual environments could have regulatory and operational consequences under European data protection laws and cybersecurity directives.

Mitigation Recommendations

1. Restrict local access to systems running Oracle VM VirtualBox to trusted and authorized personnel only, minimizing the number of users with logon capabilities. 2. Implement strict user privilege management to ensure users have the minimum necessary permissions, reducing the risk posed by low-privileged attackers. 3. Educate users about social engineering risks and the importance of not interacting with suspicious prompts or actions that could facilitate exploitation. 4. Monitor VirtualBox-related processes and logs for unusual activity that might indicate exploitation attempts or compromise. 5. Isolate VirtualBox hosts in segmented network zones to limit lateral movement in case of compromise. 6. Apply Oracle-provided patches or updates as soon as they become available, and subscribe to Oracle security advisories for timely information. 7. Consider using alternative virtualization solutions temporarily if patching is delayed and risk is unacceptable. 8. Conduct regular security assessments and penetration testing focusing on virtualization infrastructure to detect weaknesses early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.556Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97101721c03c6f13ed3

Added to database: 10/21/2025, 8:13:37 PM

Last enriched: 10/28/2025, 8:29:29 PM

Last updated: 10/30/2025, 12:16:47 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats