CVE-2025-62588
BaseFortify
Publication date: 2025-10-21
Last updated on: 2025-10-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | vm_virtualbox | 7.1.12 |
| oracle | vm_virtualbox | 7.2.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-267 | A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle VM VirtualBox product, specifically in versions 7.1.12 and 7.2.2. It allows a highly privileged attacker who already has logon access to the infrastructure running Oracle VM VirtualBox to compromise the VirtualBox software. The vulnerability can lead to a complete takeover of Oracle VM VirtualBox, affecting confidentiality, integrity, and availability.
How can this vulnerability impact me? :
If exploited, this vulnerability can result in an attacker taking over Oracle VM VirtualBox, which may lead to unauthorized access, modification, or disruption of virtual machines and related infrastructure. This can compromise the confidentiality, integrity, and availability of systems running on Oracle VM VirtualBox and potentially impact additional products due to scope change.