HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Critical Local Privilege Escalation in Oracle VirtualBox SoundBlaster 16 (CVE‑2026‑35230) Threatens Hypervisor Integrity

Oracle VirtualBox’s SoundBlaster 16 virtual audio device contains a race‑condition flaw (CVE‑2026‑35230) that lets a local attacker elevate privileges to the hypervisor. The issue affects all supported VirtualBox versions and can compromise any environment that relies on the platform, creating a high‑severity supply‑chain risk for third‑party risk managers.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
zerodayinitiative.com

Critical Local Privilege Escalation in Oracle VirtualBox SoundBlaster 16 (CVE‑2026‑35230) Threatens Hypervisor Integrity

What It Is – Oracle VirtualBox’s emulated SoundBlaster 16 device contains a race‑condition flaw that allows a local attacker to gain hypervisor‑level privileges. The vulnerability (CVE‑2026‑35230) scores 7.5 (High) on the CVSS 3.1 scale (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

Exploitability – Exploitation requires the attacker to already run code with high privileges inside a guest VM, then race the unsynchronised object handling to execute arbitrary code on the host hypervisor. No public exploit or malware‑as‑a‑service has been observed, but a proof‑of‑concept exists in the advisory.

Affected Products – Oracle VirtualBox 6.x and later releases that include the SoundBlaster 16 virtual audio device.

TPRM Impact

  • A compromised VirtualBox host can expose the entire corporate network, including production workloads, to data theft or sabotage.
  • Third‑party SaaS providers that rely on VirtualBox for development, testing, or CI/CD pipelines inherit the risk.
  • Supply‑chain knock‑on effects: malicious code injected at the hypervisor layer can propagate to downstream customers.

Recommended Actions

  • Deploy Oracle’s security update released April 2026 immediately on all VirtualBox installations.
  • Verify that the update is applied by checking the CPU patch bulletin (https://www.oracle.com/security‑alerts/cpuapr2026.html).
  • For environments where VirtualBox cannot be patched promptly, disable the SoundBlaster 16 virtual device or switch to alternative audio emulation.
  • Conduct a rapid inventory of all internal and third‑party assets that run VirtualBox; prioritize remediation for production‑critical hosts.
  • Update your TPRM risk registers to reflect a High‑severity hypervisor‑level vulnerability and reassess vendor risk scores accordingly.

Source: Zero Day Initiative Advisory – ZDI‑26‑306

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-306/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.