Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62587: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

0
High
VulnerabilityCVE-2025-62587cvecve-2025-62587
Published: Tue Oct 21 2025 (10/21/2025, 20:03:19 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle VM VirtualBox

Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:16:09 UTC

Technical Analysis

CVE-2025-62587 is a vulnerability in the core component of Oracle VM VirtualBox, specifically affecting versions 7.1.12 and 7.2.2. The flaw allows a high-privileged attacker who already has logon access to the host infrastructure where VirtualBox runs to escalate control and fully compromise the VirtualBox hypervisor. The vulnerability is classified under CWE-267, indicating improper privilege management or access control issues. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) on the host system. No user interaction (UI:N) is necessary, and the vulnerability has a scope change (S:C), meaning the impact extends beyond the initially vulnerable component to other dependent products or systems. The CVSS vector (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) reflects critical impacts on confidentiality, integrity, and availability, with the attacker able to fully take over the VirtualBox environment. This takeover could allow attackers to manipulate virtual machines, access sensitive data, disrupt services, or pivot to other systems. Although no public exploits have been reported yet, the vulnerability is considered easily exploitable given the conditions. The lack of available patches at the time of disclosure increases the urgency for mitigation through access restrictions and monitoring.

Potential Impact

The vulnerability poses a significant risk to organizations using Oracle VM VirtualBox versions 7.1.12 and 7.2.2, especially in environments where multiple virtual machines host critical workloads. Successful exploitation can lead to complete compromise of the virtualization layer, allowing attackers to manipulate guest VMs, steal sensitive data, disrupt operations, or use the compromised hypervisor as a foothold for lateral movement within the network. The scope change means that other Oracle products or third-party solutions relying on VirtualBox could also be indirectly affected, amplifying the potential damage. Enterprises relying on VirtualBox for development, testing, or production virtualization face risks to confidentiality, integrity, and availability of their systems. The requirement for high privileges limits the attack surface but does not eliminate risk, as insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation, especially given the vulnerability's ease of exploitation.

Mitigation Recommendations

1. Immediately restrict and monitor administrative and high-privilege access to hosts running Oracle VM VirtualBox to trusted personnel only. 2. Implement strict access control policies and use multi-factor authentication for all accounts with elevated privileges on affected systems. 3. Isolate VirtualBox hosts within segmented network zones to limit lateral movement if compromise occurs. 4. Monitor logs and system behavior for unusual activities indicative of privilege escalation or hypervisor compromise. 5. Apply any available patches or updates from Oracle as soon as they are released; maintain close communication with Oracle security advisories. 6. Consider temporary mitigation by disabling or limiting VirtualBox usage on critical infrastructure until patches are applied. 7. Employ host-based intrusion detection systems (HIDS) to detect anomalous behavior on hosts running VirtualBox. 8. Conduct regular security audits and privilege reviews to ensure no unauthorized high-privilege accounts exist. 9. Educate administrators about the risks of this vulnerability and the importance of safeguarding privileged credentials. 10. If possible, use alternative virtualization solutions with no known vulnerabilities until this issue is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-10-16T16:45:53.794Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97201721c03c6f13f1b

Added to database: 10/21/2025, 8:13:38 PM

Last enriched: 2/27/2026, 6:16:09 AM

Last updated: 3/25/2026, 12:09:12 AM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses