PatchSiren cyber security CVE debrief
CVE-2017-3290 Oracle CVE debrief
CVE-2017-3290 is a high-severity Oracle VM VirtualBox vulnerability in the Shared Folder component. According to the NVD record, affected releases include VirtualBox prior to 5.0.32 and prior to 5.1.14. The issue requires a local attacker with high privileges and logon access on the system where VirtualBox runs, but successful exploitation can affect integrity and availability of VirtualBox data and service, including unauthorized data modification and repeatable crashes.
- Vendor
- Oracle
- Product
- CVE-2017-3290
- CVSS
- HIGH 7.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams running Oracle VM VirtualBox on hosts where privileged local users exist, especially shared workstations, admin-heavy environments, or systems exposing shared-folder functionality to trusted-but-not-fully-trusted operators. Because the attacker needs high privileges on the host, the primary concern is insider risk or post-compromise impact reduction.
Technical summary
NVD describes CVE-2017-3290 as a vulnerability in Oracle VM VirtualBox's Shared Folder subcomponent. The CVSS v3.0 vector is AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H, reflecting a local attack that requires high privileges but can cross security boundaries and affect both integrity and availability. The NVD entry lists vulnerable CPEs for Oracle VM VirtualBox 5.0.30 and 5.1.12, and Oracle's referenced CPU advisory is included among the source links. The record does not provide a CWE beyond NVD-CWE-noinfo.
Defensive priority
Medium-high. The exploit precondition is strong (high-privileged local access), but the potential impact is serious for hosts that run VirtualBox with privileged users or sensitive shared folders.
Recommended defensive actions
- Upgrade Oracle VM VirtualBox to a fixed release at or above 5.0.32 or 5.1.14, as applicable to the deployment branch.
- Review any host accounts with administrative or equivalent privileges on VirtualBox systems; limit privileged local access where possible.
- Treat shared-folder usage as a higher-risk feature on systems with multiple trusted users and monitor those hosts for unexpected crashes or data changes.
- Validate that endpoint protection, privileged access controls, and change monitoring cover VirtualBox host systems and shared data paths.
- Use Oracle's referenced CPU advisory and the NVD detail page to confirm product/version applicability in your environment.
Evidence notes
This debrief is based on the supplied NVD CVE record and linked references. The source corpus states the vulnerability is in Oracle VM VirtualBox Shared Folder, affects versions prior to 5.0.32 and 5.1.14, and can lead to unauthorized creation, deletion, or modification of critical data or complete denial of service. The NVD CVSS vector is CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H. NVD references Oracle's January 2017 Critical Patch Update advisory and other public references. No exploit mechanics beyond the published description are included.
Official resources
-
CVE-2017-3290 CVE record
CVE.org
-
CVE-2017-3290 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
- Source reference
- Source reference
Publicly disclosed in the CVE record on 2017-01-27. The NVD entry also references Oracle's January 2017 Critical Patch Update advisory among the source links.