Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61760: Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

0
High
VulnerabilityCVE-2025-61760cvecve-2025-61760
Published: Tue Oct 21 2025 (10/21/2025, 20:03:12 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle VM VirtualBox

Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:54:59 UTC

Technical Analysis

CVE-2025-61760 is a vulnerability in the core component of Oracle VM VirtualBox, specifically affecting versions 7.1.12 and 7.2.2. The flaw arises from improper access control (CWE-284), allowing a low-privileged attacker who has authenticated access to the infrastructure hosting VirtualBox to potentially escalate privileges and compromise the VirtualBox environment. Exploitation is challenging due to the requirement for high attack complexity and the necessity of user interaction from a third party, which limits automated or remote exploitation. The vulnerability leads to a scope change, meaning that although the initial flaw is within VirtualBox, successful exploitation can impact additional products or components integrated with or dependent on VirtualBox. The CVSS 3.1 vector indicates local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), user interaction required (UI:R), scope change (S:C), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with limited access and some social engineering or trickery can cause significant damage, including full control over the VirtualBox instance. The vulnerability has been publicly disclosed with no known exploits in the wild yet, but the potential impact warrants immediate attention. Oracle has not yet provided patch links, so organizations must monitor for updates and consider interim mitigations.

Potential Impact

The potential impact of CVE-2025-61760 is substantial for organizations relying on Oracle VM VirtualBox for virtualization. A successful exploit can lead to full compromise of the VirtualBox environment, allowing attackers to execute arbitrary code, access sensitive data, and disrupt virtual machine operations. This can cascade to affect other integrated products and services, amplifying the damage. Confidentiality is at risk as attackers may access data within virtual machines or the host environment. Integrity and availability are also threatened, as attackers could alter or destroy virtual machine configurations or disrupt service availability. Enterprises using VirtualBox for critical workloads, cloud providers offering VirtualBox-based services, and organizations with multi-tenant environments are particularly vulnerable. The requirement for user interaction and local access somewhat limits the attack surface but does not eliminate risk, especially in environments with many users or weak access controls. The scope change means that the impact could extend beyond VirtualBox itself, potentially affecting broader infrastructure components.

Mitigation Recommendations

Organizations should immediately verify if they are running Oracle VM VirtualBox versions 7.1.12 or 7.2.2 and plan for prompt patching once Oracle releases updates addressing CVE-2025-61760. Until patches are available, restrict access to systems running VirtualBox to trusted personnel only and enforce strict access controls and monitoring to detect unauthorized logins. Implement network segmentation to isolate VirtualBox hosts from less trusted networks and users. Educate users about the risks of social engineering and the importance of not interacting with suspicious prompts or links, as exploitation requires user interaction. Consider disabling or limiting VirtualBox usage where feasible, especially in high-risk environments. Employ host-based intrusion detection and endpoint protection solutions to identify anomalous behavior indicative of exploitation attempts. Regularly audit and review user privileges to minimize the number of low-privileged users with access to VirtualBox infrastructure. Finally, monitor Oracle security advisories closely for patch releases and apply them promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.556Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97101721c03c6f13ed3

Added to database: 10/21/2025, 8:13:37 PM

Last enriched: 2/27/2026, 5:54:59 AM

Last updated: 3/28/2026, 9:27:44 AM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses