Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported versions that are prior to 6.1.34. Easily exploitable vulnerability allows low-privileged attackers to logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in a takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only.
CWE-285 - Improper Authorization
The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.