Oracle VirtualBox SoundBlaster 16 Race Condition Allows Hypervisor Takeover
A race condition in Oracle VirtualBox's SoundBlaster 16 virtual device, tracked as CVE-2026-35230, allows a guest attacker with high privileges to execute arbitrary code in the hypervisor context.

Oracle has patched a high-severity privilege escalation vulnerability in VirtualBox that could allow an attacker to break out of a virtual machine and seize control of the host hypervisor. The flaw, assigned CVE-2026-35230 and carrying a CVSS score of 7.5, resides in the SoundBlaster 16 emulated audio device. It was reported by the VMBreakers research team and disclosed through the Zero Day Initiative on April 28, 2026.
The vulnerability is a race condition caused by a lack of proper locking when the SoundBlaster 16 device performs operations on an object. An attacker who first gains high-privileged code execution inside the guest operating system can trigger the race to corrupt kernel memory. This enables escalation of privileges from the guest to the hypervisor, allowing arbitrary code execution at the highest privilege level on the host.
Because the attack requires high privileges within the guest, it is not a simple guest-to-host breakout that could be triggered by unprivileged malware. However, in multi-tenant cloud environments or virtual desktop infrastructure (VDI) deployments where a malicious actor already has elevated access inside a VM, the bug could be used to compromise the entire hypervisor and potentially pivot to other virtual machines on the same host.
Oracle addressed the issue in its April 2026 Critical Patch Update (CPU), which was released on the same day as the advisory. The patch is available through the standard Oracle update channels. Users and administrators are strongly advised to apply the update immediately, especially if VirtualBox is used in production or multi-tenant scenarios.
No active exploitation of CVE-2026-35230 has been reported in the wild as of the advisory date. However, the detailed disclosure from ZDI provides enough technical information for skilled attackers to develop an exploit. The VMBreakers team — composed of Sangbin Kim, Gangmin Kim, and Un3xploitable — has a track record of finding hypervisor escape bugs, making this a credible threat.
This vulnerability is the latest in a long line of VirtualBox bugs that allow guest-to-host escape. The emulated SoundBlaster 16 device has been a frequent source of security issues, as its complexity and legacy codebase make it difficult to harden. The April 2026 CPU also addressed several other VirtualBox flaws, underscoring the importance of keeping virtualization software up to date.
For organizations relying on Oracle VirtualBox, the recommended mitigation is to apply the April 2026 CPU without delay. In environments where patching is not immediately possible, administrators should restrict high-privileged access to virtual machines and monitor for unusual hypervisor behavior. The full advisory is available at the Zero Day Initiative and Oracle's security alerts page.