CVE-2021-2123
low-risk
Published 2021-01-20
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.2/10
Low
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://security.gentoo.org/glsa/202101-15
Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html
Third Party Advisory
https://security.gentoo.org/glsa/202101-15
Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html
17
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal