Changeflow GovPing Data Privacy & Cybersecurity Oracle VirtualBox v7.2.6 Multiple Security Vuln...
Priority review Guidance Added Final

Oracle VirtualBox v7.2.6 Multiple Security Vulnerabilities

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published
Detected
Email

Summary

CERT-FR publishedAvis CERTFR-2026-AVI-0472 on 22 April 2026, disclosing 9 CVEs affecting Oracle VM VirtualBox version 7.2.6. The vulnerabilities enable remote code execution, remote denial of service, data confidentiality breaches, and data integrity compromises. Organizations using Oracle Virtualization products should refer to Oracle's cpuapr2026 security bulletin for patch information.

“De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.”

CERT-FR , verbatim from source
Published by CERT-FR on cert.ssi.gouv.fr . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors CERT-FR Security Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 183 changes logged to date.

What changed

CERT-FR issued a security advisory disclosing multiple vulnerabilities in Oracle VM VirtualBox version 7.2.6, affecting organizations using Oracle's virtualization products. The advisory covers nine CVEs (CVE-2026-35230 through CVE-2026-35251), with risks including remote code execution, remote denial of service, data confidentiality breaches, and data integrity compromises. Organizations using Oracle VirtualBox should refer to Oracle's cpuapr2026 security bulletin to obtain and apply the appropriate patches. This advisory supplements Oracle's own security release by providing French national-level notification through the ANSSI-affiliated CERT.

Affected parties should prioritize patching Oracle VM VirtualBox installations given the severity of potential impacts including arbitrary remote code execution. IT security teams managing virtualization infrastructure should verify their Oracle VirtualBox version and apply Oracle's available patches without delay.

Archived snapshot

Apr 22, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 22 avril 2026 N° CERTFR-2026-AVI-0472 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Oracle Virtualization

Gestion du document

| Référence | CERTFR-2026-AVI-0472 |
| Titre | Multiples vulnérabilités dans Oracle Virtualization |
| Date de la première version | 22 avril 2026 |
| Date de la dernière version | 22 avril 2026 |
| Source(s) | Bulletin de sécurité Oracle Virtualization cpuapr2026 du 21 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à l'intégrité des données
  • Atteinte à la confidentialité des données
  • Déni de service à distance
  • Exécution de code arbitraire à distance

Systèmes affectés

  • Oracle VM VirtualBox version 7.2.6

Résumé

De multiples vulnérabilités ont été découvertes dans Oracle Virtualization. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 22 avril 2026 Version initiale

Get daily alerts for CERT-FR Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-FR
Published
April 22nd, 2026
Instrument
Guidance
Branch
Executive
Source language
fr
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0472

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Virtualization software patching Cybersecurity vulnerability remediation
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software & Technology

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!