{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-39425","assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","dateUpdated":"2024-09-17T14:20:57.926Z","dateReserved":"2022-09-02T00:00:00.000Z","datePublished":"2022-10-18T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle","dateUpdated":"2022-12-19T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)."}],"affected":[{"vendor":"Oracle Corporation","product":"VM VirtualBox","versions":[{"version":"unspecified","lessThan":"6.1.40","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html"},{"name":"GLSA-202212-03","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202212-03"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox."}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:07:41.979Z"},"title":"CVE Program Container","references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html","tags":["x_transferred"]},{"name":"GLSA-202212-03","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202212-03"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-306","lang":"en","description":"CWE-306 Missing Authentication for Critical Function"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-17T14:19:43.750220Z","id":"CVE-2022-39425","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-17T14:20:57.926Z"}}]}}