Company Details
vois
20,303
459,249
5415
vodafone.com
0
VOI_5470264
In-progress


VOIS Company CyberSecurity Posture
vodafone.comVOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.
Company Details
vois
20,303
459,249
5415
vodafone.com
0
VOI_5470264
In-progress
Between 750 and 799

VOIS Global Score (TPRM)XXXX

Description: Vodafone realised they suffered a data breach after that cybercriminals have broken into a sales partner and copied sensitive data. There has been a cyber issue at Vodafone's partner Vertriebswerk in which critical data leaked; this is not a phishing email; many Vodafone customers are currently receiving emails requesting them to set a new password. Name, birthday, email address, mobile phone number, address, bank information (IBAN/BIC), and customer password are all impacted, according to Vodafone in the email that is available online. Vodafone promptly reported the occurrence to the Federal Commissioner for Data Protection and Freedom of Information.
Description: Vodafone's online sales of "Callya" prepaid cards were impacted by the purported ransomware attack on the IT service company Materna. The Vodafone website stopped selling the SIM cards, just after Materna had given the business permission to launch a "professionally elaborated cyber attack. Both businesses emphasise that there hasn't been any determination of a consumer data leak. "Restrictions on online sales and online registration of Callya products" should be lifted soon, according to Vodafone. Until then, there would be other ways to make the reservation. Many clients' systems were also impacted by the Materna security breach. There were Materna-operated check-in machine outages at several German airports. Workers were "equipped with newly installed or completely newly configured systems," which had never been linked to the impacted infrastructure.
Description: Vodafone Italia suffered a data breach incident after one of its commercial partners, FourB S.p.A., which operates as a reseller of telecommunications services in the country, suffered a cyberattack. The cyberattack took place in the first week of September and resulted in the compromise of sensitive subscriber details. The exposed information includes subscription details, identity documents with sensitive data, and contact details. Even KelvinSecurity offered to sell a collection of 295,000 files totalling 310 GB of data they allegedly stole from Vodafone Italia and advertised the cache on messaging platforms and at least one hacker forum.
Description: The customer data services of Vodafone Portugal went down recently in several areas as it was targeted in a malicious cyberattack. The 3G network was fixed in the entire county while services like 4G and 5G mobile networks, fixed voice, television, SMS, and voice/digital answering services are still offline. The company is investigating the largest cybersecurity incident with the help of local and international cyber security teams.
Description: Vodafone realised they suffered a data breach after one of its customers recieved the personal details of 18 other Vodafone customers. The details included name, address and phone numbers for 18 customer accounts along with her e-bill. The company investigated the incident and found out that the issue was a result of an isolated technical glitch which they fixed afterwards.
Description: Vodafone claims that hackers attempted to access consumers' accounts by using the emails and passwords they had taken from an unidentified source. At that moment, the business started a thorough investigation to get all the information needed to provide the best guidance possible to any impacted clients. The telecoms provider claims that 1,827 customer accounts were hacked by the crooks, who obtained the last four digits of the consumers' bank accounts, their names, and their mobile phone numbers. Although credit or debit card numbers or other information were not acquired, it is crucial to remember that information that is accessible by thieves may be utilized for fraudulent purposes.
Description: An intruder hacked into a Vodafone Group Plc (VOD) server in Germany and gained access to 2 million customers’ personal details and banking information. A person stole data including names, addresses, birth dates, and bank account information. However, the hacker had no access to credit card information, passwords, PIN numbers or mobile-phone numbers.


No incidents recorded for VOIS in 2026.
No incidents recorded for VOIS in 2026.
No incidents recorded for VOIS in 2026.
VOIS cyber incidents detection timeline including parent company and subsidiaries

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.


GFT Technologies is an AI-centric global digital transformation company. We design advanced data and AI transformation solutions, modernize technology architectures and develop next-generation core systems for industry leaders in Banking, Insurance, Manufacturing and Robotics. Partnering closely wit

Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services -- now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure e

Part of the Capgemini Group, Sogeti makes business value through technology for organizations that need to implement innovation at speed and want a local partner with global scale. With a hands-on culture and close proximity to its clients, Sogeti implements solutions that will help organizations wo

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to
At CDW, we know how to make technology work so people can do great things. Our experts bring a full-stack, full-lifestyle approach with custom solutions, services and relationships to bring your vision to life. Through decades of experience, scale, and deep industry expertise, we deliver the full

Since 1993, EPAM Systems, Inc. (NYSE: EPAM) has used its software engineering expertise to become a leading global provider of digital engineering, cloud and AI-enabled transformation services, and a leading business and experience consulting partner for global enterprises and ambitious startups. We

A AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. Embracing an AI-first approach, FPT Software enables breakthrough speed, scalability and quali

Your digitalization partner with industry expertise With locations in more than 26 countries and over 26,000 employees (2024), T-Systems is one of the leading providers of digital services in Europe. The Deutsche Telekom subsidiary is headquartered in Germany and has a presence in Europe as well as
.png)
According to ICT PS John Tanui, the agency will strengthen coordination in responding to cyber threats and complement existing structures...
The global voice biometrics market size was valued at $2.30 billion in 2024 & is projected to grow from $2.87 billion in 2025 to $15.69...
After continued success, Telkom Business has quickly become known as a trusted ICT integration leader in South Africa.
VOIS Romania, one of the largest IT&C employers locally, has announced the opening of a new office in Iasi.
06 Nov 2025. Kube Networks Limited (“KubeNet”), a leading Glasgow-based ISP and award-winning provider of managed IT & infrastructure services, cloud,...
Generative AI has moved beyond the "model arms race" into practical deployment, and Taiwan Mobile (TWM) is moving quickly to capitalize on...
28 Aug 2025. KubeNet, a leading Glasgow based ISP and provider of managed IT & infrastructure services, cloud, Internet, voice, cybersecurity and IoT...
Discover the LinkedIn Top Voices in Singapore for 2025—leaders and experts sharing clear insights on work, leadership, business, and local industry trends.
The Modern Healthcare Content Studio is on the ground in Maryland at Premier's Breakthroughs 25, delivering exclusive, real-time coverage of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of VOIS is https://www.vodafone.com/what-we-do/services/vois.
According to Rankiteo, VOIS’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, VOIS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, VOIS has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, VOIS is not certified under SOC 2 Type 1.
According to Rankiteo, VOIS does not hold a SOC 2 Type 2 certification.
According to Rankiteo, VOIS is not listed as GDPR compliant.
According to Rankiteo, VOIS does not currently maintain PCI DSS compliance.
According to Rankiteo, VOIS is not compliant with HIPAA regulations.
According to Rankiteo,VOIS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
VOIS operates primarily in the IT Services and IT Consulting industry.
VOIS employs approximately 20,303 people worldwide.
VOIS presently has no subsidiaries across any sectors.
VOIS’s official LinkedIn profile has approximately 459,249 followers.
VOIS is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, VOIS does not have a profile on Crunchbase.
Yes, VOIS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/vois.
As of January 21, 2026, Rankiteo reports that VOIS has experienced 7 cybersecurity incidents.
VOIS has an estimated 38,438 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Data Leak, Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with local and international cyber security teams, and remediation measures with technical glitch fixed, and communication strategy with notified customers via email to reset their passwords, and communication strategy with informing affected customers and providing guidance, and remediation measures with newly installed or completely newly configured systems for workers, and communication strategy with vodafone's statement about lifting restrictions soon..
Title: Vodafone Portugal Cyberattack
Description: The customer data services of Vodafone Portugal went down recently in several areas as it was targeted in a malicious cyberattack. The 3G network was fixed in the entire county while services like 4G and 5G mobile networks, fixed voice, television, SMS, and voice/digital answering services are still offline. The company is investigating the largest cybersecurity incident with the help of local and international cyber security teams.
Type: Cyberattack
Title: Vodafone Data Breach
Description: Vodafone suffered a data breach when a customer received the personal details of 18 other Vodafone customers due to a technical glitch.
Type: Data Breach
Vulnerability Exploited: Technical Glitch
Title: Vodafone Italia Data Breach Incident
Description: Vodafone Italia suffered a data breach incident after one of its commercial partners, FourB S.p.A., which operates as a reseller of telecommunications services in the country, suffered a cyberattack.
Type: Data Breach
Threat Actor: FourB S.p.A.Even KelvinSecurity
Title: Vodafone Data Breach
Description: An intruder hacked into a Vodafone Group Plc (VOD) server in Germany and gained access to 2 million customers’ personal details and banking information.
Type: Data Breach
Attack Vector: Server Hack
Threat Actor: Unknown
Title: Vodafone Data Breach via Vertriebswerk
Description: Vodafone experienced a data breach after cybercriminals infiltrated a sales partner, Vertriebswerk, and copied sensitive data. The breach involved the leakage of critical customer information, prompting Vodafone to notify affected customers and request password resets.
Type: Data Breach
Attack Vector: Data Breach
Threat Actor: Cybercriminals
Motivation: Unauthorized Access to Sensitive Data
Title: Vodafone Data Breach
Description: Hackers attempted to access consumers' accounts by using the emails and passwords they had taken from an unidentified source. The telecoms provider claims that 1,827 customer accounts were hacked by the crooks, who obtained the last four digits of the consumers' bank accounts, their names, and their mobile phone numbers. Although credit or debit card numbers or other information were not acquired, it is crucial to remember that information that is accessible by thieves may be utilized for fraudulent purposes.
Type: Data Breach
Attack Vector: Stolen Credentials
Threat Actor: Unknown Hackers
Motivation: Data Theft
Title: Ransomware Attack on Materna Affects Vodafone and German Airports
Description: Vodafone's online sales of 'Callya' prepaid cards were impacted by the purported ransomware attack on the IT service company Materna. The Vodafone website stopped selling the SIM cards, just after Materna had given the business permission to launch a 'professionally elaborated cyber attack.' Both businesses emphasise that there hasn't been any determination of a consumer data leak. 'Restrictions on online sales and online registration of Callya products' should be lifted soon, according to Vodafone. Until then, there would be other ways to make the reservation. Many clients' systems were also impacted by the Materna security breach. There were Materna-operated check-in machine outages at several German airports. Workers were 'equipped with newly installed or completely newly configured systems,' which had never been linked to the impacted infrastructure.
Type: Ransomware Attack
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Sales Partner (Vertriebswerk) and Stolen Credentials.

Systems Affected: 4G and 5G mobile networksfixed voicetelevisionSMSvoice/digital answering services

Data Compromised: Personal details including name, address, and phone numbers

Data Compromised: Subscription details, Identity documents with sensitive data, Contact details

Data Compromised: Names, Addresses, Birth dates, Bank account information

Data Compromised: Name, Birthday, Email address, Mobile phone number, Address, Bank information (iban/bic), Customer password

Data Compromised: Names, Mobile phone numbers, Last four digits of bank account numbers
Identity Theft Risk: High
Payment Information Risk: Low

Systems Affected: Vodafone's online sales of 'Callya' prepaid cardsMaterna-operated check-in machines at German airports
Operational Impact: Suspension of online sales and registration of Callya productsCheck-in machine outages at German airports
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiable Information, Subscription Details, Identity Documents With Sensitive Data, Contact Details, , Personal Identifiable Information, Bank Account Information, , Personally Identifiable Information, Bank Information, , Personally Identifiable Information, Bank Account Information and .

Entity Name: Vodafone Portugal
Entity Type: Telecommunications
Industry: Telecommunications
Location: Portugal

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 18

Entity Name: Vodafone Italia
Entity Type: Telecommunications
Industry: Telecommunications
Location: Italy

Entity Name: FourB S.p.A.
Entity Type: Reseller
Industry: Telecommunications
Location: Italy

Entity Name: Vodafone Group Plc
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: Germany
Customers Affected: 2 million

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications

Entity Name: Vodafone
Entity Type: Telecommunications Provider
Industry: Telecommunications
Customers Affected: 1827

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications

Entity Name: Materna
Entity Type: IT Service Company
Industry: Information Technology

Entity Name: German Airports
Entity Type: Airport
Industry: Aviation
Location: Germany

Third Party Assistance: Local And International Cyber Security Teams.

Remediation Measures: Technical glitch fixed

Communication Strategy: Notified customers via email to reset their passwords

Communication Strategy: Informing affected customers and providing guidance

Remediation Measures: Newly installed or completely newly configured systems for workers
Communication Strategy: Vodafone's statement about lifting restrictions soon
Third-Party Assistance: The company involves third-party assistance in incident response through local and international cyber security teams, .

Type of Data Compromised: Personal Identifiable Information
Number of Records Exposed: 18
Sensitivity of Data: Medium
Personally Identifiable Information: Name, Address, Phone Numbers

Type of Data Compromised: Subscription details, Identity documents with sensitive data, Contact details
Number of Records Exposed: 295,000
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Personal identifiable information, Bank account information
Number of Records Exposed: 2 million
Sensitivity of Data: High
Personally Identifiable Information: namesaddressesbirth dates

Type of Data Compromised: Personally identifiable information, Bank information
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information, Bank account information
Number of Records Exposed: 1827
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Technical glitch fixed, Newly installed or completely newly configured systems for workers, .

Regulatory Notifications: Reported to the Federal Commissioner for Data Protection and Freedom of Information

Source: Online Email Notification
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Online Email Notification.

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified customers via email to reset their passwords, Informing affected customers and providing guidance and Vodafone'S Statement About Lifting Restrictions Soon.

Customer Advisories: Emails requesting password resets

Customer Advisories: Guidance provided to affected customers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Emails requesting password resets and Guidance provided to affected customers.

Entry Point: Sales Partner (Vertriebswerk)

Entry Point: Stolen Credentials

Root Causes: Technical Glitch
Corrective Actions: Technical glitch fixed
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Local And International Cyber Security Teams, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Technical glitch fixed.
Last Attacking Group: The attacking group in the last incident were an FourB S.p.A.Even KelvinSecurity, Unknown, Cybercriminals and Unknown Hackers.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal details including name, address, and phone numbers, subscription details, identity documents with sensitive data, contact details, , names, addresses, birth dates, bank account information, , Name, Birthday, Email Address, Mobile Phone Number, Address, Bank Information (IBAN/BIC), Customer Password, , Names, Mobile Phone Numbers, Last Four Digits of Bank Account Numbers and .
Most Significant System Affected: The most significant system affected in an incident was 4G and 5G mobile networksfixed voicetelevisionSMSvoice/digital answering services and Vodafone's online sales of 'Callya' prepaid cardsMaterna-operated check-in machines at German airports.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was local and international cyber security teams, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were birth dates, Personal details including name, address, and phone numbers, Bank Information (IBAN/BIC), identity documents with sensitive data, Name, subscription details, Birthday, Address, names, Names, Customer Password, Mobile Phone Number, Last Four Digits of Bank Account Numbers, bank account information, Mobile Phone Numbers, addresses, Email Address and contact details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.3M.
Most Recent Source: The most recent source of information about an incident is Online Email Notification.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Emails requesting password resets and Guidance provided to affected customers.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Stolen Credentials and Sales Partner (Vertriebswerk).
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.