Skip to main content

Proof-of-Concept Released Oracle VM VirtualBox

CVE-2025-30712 could allow an attacker to escape the virtual machine and gain unauthorised access to Oracle VM VirtualBox accessible data

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

CVE-2025-30712 could allow an attacker to escape the virtual machine and gain unauthorised access to Oracle VM VirtualBox accessible data


Affected platforms

The following platforms are known to be affected:

Threat details

Proof-of-Concept released for CVE-2025-30712

A public proof-of-concept exploit is available CVE-2025-30712. The NHS England National CSOC assesses exploitation of this vulnerability as more likely.


Introduction

Oracle has released a security update to address a critical vulnerability in Oracle VM VirtualBox. Oracle VM VirtualBox is cross-platform virtualisation software.

CVE-2025-30712 is an 'improper access control' vulnerability with a CVSSv3 score of 8.1 that affects the Oracle Virtualisation component of VirtualBox. Successful exploitation could allow an attacker with administrative privileges to gain linear memory access, leading to arbitrary read/write access in the host memory, enabling virtual machine escape. The attacker could gain unauthorised access to all Oracle VM VirtualBox accessible data or critical data and that could lead to a partial denial-of-service (DoS) attack. 

Note: Oracle has advised that CVE-2025-30712 may significantly impact other Oracle VM products.


Remediation advice

Affected organisations are encouraged to review Oracle's Critical Patch Update and apply the relevant updates as soon as practicable.



Last edited: 16 May 2025 1:40 pm