{"id":39786,"date":"2025-10-25T07:42:07","date_gmt":"2025-10-25T05:42:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=39786"},"modified":"2025-10-25T07:42:07","modified_gmt":"2025-10-25T05:42:07","slug":"virtualbox-7-1-12-and-7-2-2-vulnerability-cve-2025-62641","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/10\/25\/virtualbox-7-1-12-and-7-2-2-vulnerability-cve-2025-62641\/","title":{"rendered":"Virtualbox 7.1.12 and 7.2.2: Vulnerability CVE-2025-62641"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Virtualbox\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2014\/04\/VBlogo.jpg\" alt=\"Virtualbox\" width=\"52\" height=\"55\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/10\/24\/virtualbox-7-1-12-und-7-2-2-schwachstelle-cve-2025-62641\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]It has just been announced that Virtualbox 7.1.12 and 7.2.2 contain the CVE-2025-62641 vulnerability. This could allow attackers to take over the host. There are also other vulnerabilities in these versions. Virtualbox 7.1.14 and 7.2.4 provide a remedy.<\/p>\n<p><!--more--><\/p>\n<p>On August 14, 2025, Oracle's developers released Virtualbox version 7.2 (see <a href=\"https:\/\/borncity.com\/win\/2025\/08\/24\/virtualbox-7-2-fixes-arm-bugs\/\">VirtualBox 7.2 released<\/a>). A few days ago, I came across the following tweet stating that Virtualbox 7.1.12 and 7.2.2 contain the vulnerability CVE-2025-62641<\/p>\n<p><a href=\"https:\/\/www.oracle.com\/security-alerts\/cpuoct2025.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2025\/10\/0MRorSX.png\" alt=\"Virtualbox Schwachstelle CVE-2025-62641\" width=\"529\" height=\"678\" \/><\/a><\/p>\n<p>Vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-62641\" target=\"_blank\" rel=\"noopener\">CVE-2025-62641<\/a> exists in the core of Oracle VirtualBox versions 7.1.12 and 7.2.2. This easily exploitable vulnerability allows an attacker with high privileges logged into the infrastructure running Oracle VM VirtualBox to compromise Oracle VM VirtualBox.<\/p>\n<p>Although the vulnerability exists in Oracle VM VirtualBox, attacks could have a significant impact on other products (change in scope). Successful attacks on this vulnerability could lead to the takeover of Oracle VM VirtualBox.<\/p>\n<p>Oracle published <a href=\"https:\/\/www.oracle.com\/security-alerts\/cpuoct2025verbose.html#OVIR\" target=\"_blank\" rel=\"noopener\">this security advisory<\/a> on October 23, 2025, with a list of additional vulnerabilities. Users of Virtualbox 7.2.x can update to 7.2.4 (<a href=\"https:\/\/borncity.com\/win\/2025\/10\/22\/virtualbox-7-2-4-released\/\">VirtualBox 7.2.4 released<\/a>). Users of Virtualbox 7.1.12 should upgrade to <a href=\"https:\/\/www.virtualbox.org\/wiki\/Changelog-7.1\" target=\"_blank\" rel=\"noopener\">version 7.1.14<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]It has just been announced that Virtualbox 7.1.12 and 7.2.2 contain the CVE-2025-62641 vulnerability. This could allow attackers to take over the host. There are also other vulnerabilities in these versions. Virtualbox 7.1.14 and 7.2.4 provide a remedy.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,1218],"tags":[69,939,651],"class_list":["post-39786","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-virtualization","tag-security","tag-virtualbox","tag-virtualization"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=39786"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39786\/revisions"}],"predecessor-version":[{"id":39787,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39786\/revisions\/39787"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=39786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=39786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=39786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}