Proof-of-Concept Released Oracle VM VirtualBox
CVE-2025-30712 could allow an attacker to escape the virtual machine and gain unauthorised access to Oracle VM VirtualBox accessible data
Summary
CVE-2025-30712 could allow an attacker to escape the virtual machine and gain unauthorised access to Oracle VM VirtualBox accessible data
Threat details
Proof-of-Concept released for CVE-2025-30712
A public proof-of-concept exploit is available CVE-2025-30712. The NHS England National CSOC assesses exploitation of this vulnerability as more likely.
Introduction
Oracle has released a security update to address a critical vulnerability in Oracle VM VirtualBox. Oracle VM VirtualBox is cross-platform virtualisation software.
CVE-2025-30712 is an 'improper access control' vulnerability with a CVSSv3 score of 8.1 that affects the Oracle Virtualisation component of VirtualBox. Successful exploitation could allow an attacker with administrative privileges to gain linear memory access, leading to arbitrary read/write access in the host memory, enabling virtual machine escape. The attacker could gain unauthorised access to all Oracle VM VirtualBox accessible data or critical data and that could lead to a partial denial-of-service (DoS) attack.
Note: Oracle has advised that CVE-2025-30712 may significantly impact other Oracle VM products.
Remediation advice
Affected organisations are encouraged to review Oracle's Critical Patch Update and apply the relevant updates as soon as practicable.
Definitive source of threat updates
Last edited: 16 May 2025 1:40 pm