Description

Oracle has disclosed multiple critical vulnerabilities in its Oracle VM VirtualBox software, detailed in the October 2025 Critical Patch Update (CPU). The flaws, affecting VirtualBox Core components in versions 7.1.12 and 7.2.2, could allow high-privileged local attackers to compromise the virtualization environment fully. Although exploitation requires local access, the vulnerabilities enable attackers to breach confidentiality, integrity, and availability, potentially leading to complete system takeover. The issues stem from improper privilege handling and unsafe operations, posing a serious threat to both enterprise and individual users who rely on VirtualBox for isolation, development, and testing purposes. Oracle’s advisory lists nine CVEs (including CVE-2025-62587 through CVE-2025-62590 and CVE-2025-62641) with CVSS 3.1 Base Scores up to 8.2, marking them as high-severity. While all vulnerabilities require local access and no remote authentication, they can escalate privileges and impact host systems due to scope changes. Lower-severity flaws, such as CVE-2025-61759 and CVE-2025-62591–62592, scored between 6.0 and 6.5, affecting confidentiality without major system disruption. Experts caution that the flaws could enable malware persistence, data leakage, or ransomware deployment across virtual environments. Although no active exploitation has been reported, the vulnerabilities’ low attack complexity heightens risk. Oracle strongly urges immediate patching via its official download portal. Organizations are advised to apply the CPU updates, enforce least-privilege access controls, and monitor high-privileged accounts. Network segmentation, disabling unused features, and routine auditing can further reduce exposure. For users unable to patch promptly, temporary mitigations include restricting local logon privileges and performing regular system integrity checks to prevent potential exploitation or lateral movement within virtualized infrastructures.