Skip to main content

CVE-2025-46713: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in sandboxie-plus Sandboxie

High
VulnerabilityCVE-2025-46713cvecve-2025-46713cwe-120
Published: Thu May 22 2025 (05/22/2025, 12:23:16 UTC)
Source: CVE
Vendor/Project: sandboxie-plus
Product: Sandboxie

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 0.0.1 and prior to 1.15.12, API_SET_SECURE_PARAM may have an arithmetic overflow deep in the memory allocation subsystem that would lead to a smaller allocation than requested, and a buffer overflow. Version 1.15.12 fixes the issue.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:28:16 UTC

Technical Analysis

CVE-2025-46713 is a high-severity buffer overflow vulnerability affecting the Sandboxie-plus software, a sandbox-based isolation tool for Windows NT-based operating systems (both 32-bit and 64-bit). The vulnerability exists in versions starting from 0.0.1 up to but not including 1.15.12. The root cause is an arithmetic overflow in the API_SET_SECURE_PARAM function within the memory allocation subsystem. This overflow causes the system to allocate less memory than requested, leading to a classic buffer overflow (CWE-120) when data is copied without proper size checks. Exploiting this vulnerability could allow an attacker with limited privileges (local access with low privileges) to execute arbitrary code with elevated privileges, compromise confidentiality, integrity, and availability of the system. The CVSS v3.1 score is 7.8, reflecting high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the nature of sandbox software, which is often used to isolate potentially dangerous processes. Successful exploitation could allow an attacker to escape the sandbox environment, gaining unauthorized access to the host system and potentially executing malicious code or escalating privileges. The issue was fixed in version 1.15.12 of Sandboxie-plus.

Potential Impact

For European organizations, this vulnerability presents a critical risk particularly for entities relying on Sandboxie-plus for application isolation, malware analysis, or secure browsing environments. Exploitation could lead to sandbox escape, allowing attackers to execute arbitrary code on the host system, potentially leading to data breaches, system compromise, or lateral movement within networks. This is especially concerning for sectors with high security requirements such as finance, healthcare, government, and critical infrastructure. The local attack vector means that attackers need some level of access to the system, but given the low complexity and no user interaction required, insider threats or malware that gains initial foothold could leverage this flaw to escalate privileges and bypass security controls. The confidentiality, integrity, and availability of sensitive data and systems could be severely impacted, resulting in operational disruption, regulatory non-compliance, and reputational damage.

Mitigation Recommendations

European organizations should immediately verify their use of Sandboxie-plus and ensure that all installations are upgraded to version 1.15.12 or later, where the vulnerability is patched. For environments where immediate patching is not feasible, restricting local access to systems running Sandboxie-plus is critical to reduce the attack surface. Implement strict access controls and monitoring to detect any suspicious local activity. Employ application whitelisting and endpoint detection and response (EDR) solutions to identify attempts to exploit buffer overflows or sandbox escapes. Additionally, conduct regular security audits and vulnerability assessments focused on sandbox environments. Network segmentation should be used to limit the impact of any potential compromise. Finally, educate users and administrators about the risks of local privilege escalation and sandbox escape vulnerabilities to improve overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-28T20:56:09.083Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f1a9a0acd01a24925abd4

Added to database: 5/22/2025, 12:37:46 PM

Last enriched: 7/7/2025, 10:28:16 AM

Last updated: 8/15/2025, 5:51:52 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats