Cyber Posture

CVE-2026-21987

High

Published: 20 January 2026

Published
20 January 2026
Modified
29 January 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0001 3.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21987 is a high-severity an unspecified weakness vulnerability in Oracle Vm Virtualbox. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the core component flaw in affected Oracle VM VirtualBox versions, preventing exploitation by high-privileged local attackers.

prevent

Enforces least privilege to deny the high privileges (PR:H) required for local logon attackers to exploit the vulnerability.

prevent

Identifies the presence of vulnerable VirtualBox versions through scanning, enabling timely remediation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local high-priv exploit with scope change enables privilege escalation to take over VirtualBox and impact other components.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise…

more

Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Deeper analysisAI

CVE-2026-21987 is a vulnerability in the Core component of Oracle VM VirtualBox, part of Oracle Virtualization. The supported versions affected are 7.1.14 and 7.2.4. It has a CVSS 3.1 Base Score of 8.2, with the vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H, indicating high impacts to confidentiality, integrity, and availability.

The vulnerability is easily exploitable by a high-privileged attacker (PR:H) who has logon access to the infrastructure where Oracle VM VirtualBox executes (AV:L, AC:L, UI:N). Successful exploitation enables takeover of Oracle VM VirtualBox, and due to the changed scope (S:C), attacks may significantly impact additional products.

The Oracle Critical Patch Update for January 2026 provides details on mitigation and available patches, accessible at https://www.oracle.com/security-alerts/cpujan2026.html.

Details

CWE(s)

Affected Products

oracle
vm virtualbox
7.1.14, 7.2.4

CVEs Like This One

CVE-2026-35251Same product: Oracle Vm Virtualbox
CVE-2026-21956Same product: Oracle Vm Virtualbox
CVE-2026-21957Same product: Oracle Vm Virtualbox
CVE-2025-21571Same product: Oracle Vm Virtualbox
CVE-2026-21990Same product: Oracle Vm Virtualbox
CVE-2026-35246Same product: Oracle Vm Virtualbox
CVE-2026-35242Same product: Oracle Vm Virtualbox
CVE-2026-21983Same product: Oracle Vm Virtualbox
CVE-2026-21955Same product: Oracle Vm Virtualbox
CVE-2026-21988Same product: Oracle Vm Virtualbox

References