<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35245 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35245/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 21:16:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35245/feed.xml" rel="self" type="application/rss+xml"/><item><title>Oracle VirtualBox Unauthenticated RDP Denial-of-Service Vulnerability (CVE-2026-35245)</title><link>https://feed.craftedsignal.io/briefs/2026-04-virtualbox-dos/</link><pubDate>Tue, 21 Apr 2026 21:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-virtualbox-dos/</guid><description>An unauthenticated attacker with network access via RDP can exploit CVE-2026-35245 in Oracle VM VirtualBox version 7.2.6 to cause a denial-of-service (DOS) condition.</description><content:encoded><![CDATA[<p>CVE-2026-35245 is a vulnerability affecting Oracle VM VirtualBox version 7.2.6. This vulnerability resides in the Core component of VirtualBox and can be exploited by unauthenticated attackers with network access to the RDP service. Successful exploitation leads to a denial-of-service (DOS) condition, causing the VirtualBox application to hang or crash. The vulnerability&rsquo;s ease of exploitation makes it a significant threat to systems running vulnerable versions of VirtualBox exposed to untrusted networks. This vulnerability allows an attacker to disrupt virtual machine operations, potentially impacting services relying on the virtualized environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target system running Oracle VM VirtualBox version 7.2.6 with the RDP service exposed.</li>
<li>The attacker establishes a network connection to the target system&rsquo;s RDP port (typically TCP 3389).</li>
<li>The attacker sends a specially crafted RDP request to the vulnerable VirtualBox instance, exploiting CVE-2026-35245.</li>
<li>The malicious RDP request triggers a flaw within the VirtualBox Core component.</li>
<li>The VirtualBox application enters a hung state due to the unhandled exception.</li>
<li>Alternatively, the VirtualBox application may crash due to the exploited vulnerability.</li>
<li>The virtual machines hosted on the affected VirtualBox instance become unavailable.</li>
<li>The attacker successfully causes a denial-of-service (DOS) condition, disrupting VirtualBox operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35245 results in a denial-of-service condition, where the Oracle VM VirtualBox application hangs or crashes. This impacts the availability of virtual machines running on the affected VirtualBox instance, potentially disrupting critical services and applications. The vulnerability affects VirtualBox version 7.2.6 and poses a risk to organizations utilizing this virtualization platform, especially those with exposed RDP services. The CVSS v3.1 base score is 7.5, reflecting the high availability impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Oracle VM VirtualBox to a version beyond 7.2.6 to patch CVE-2026-35245.</li>
<li>Implement network segmentation and access controls to restrict access to the RDP service, mitigating the risk of external attackers exploiting CVE-2026-35245.</li>
<li>Monitor RDP connections for suspicious activity, such as connections from unexpected source IPs, to detect potential exploitation attempts targeting CVE-2026-35245.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousRDPConnections</code> to identify unusual RDP activity that may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>virtualbox</category><category>rdp</category><category>dos</category><category>cve-2026-35245</category></item></channel></rss>