Skip to main content

CVE-2025-46714: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in sandboxie-plus Sandboxie

High
VulnerabilityCVE-2025-46714cvecve-2025-46714cwe-120
Published: Thu May 22 2025 (05/22/2025, 12:27:57 UTC)
Source: CVE
Vendor/Project: sandboxie-plus
Product: Sandboxie

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. Version 1.15.12 fixes the issue.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:41:07 UTC

Technical Analysis

CVE-2025-46714 is a high-severity buffer overflow vulnerability affecting Sandboxie, a sandbox-based isolation software widely used on 32-bit and 64-bit Windows NT-based operating systems. The vulnerability exists in versions starting from 1.3.0 up to but not including 1.15.12. It arises from an arithmetic overflow in the API_GET_SECURE_PARAM function, which leads to a small memory allocation followed by an excessively large memory copy operation into this undersized buffer. This classic buffer overflow (CWE-120) can result in memory corruption, allowing an attacker with limited privileges (local access with low privileges) to execute arbitrary code with elevated privileges, compromise system confidentiality, integrity, and availability. The vulnerability does not require user interaction but does require local access with some privileges, making it a local privilege escalation vector. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required. The issue was fixed in version 1.15.12 of Sandboxie. No known exploits are currently reported in the wild, but the nature of the vulnerability makes it a critical target for attackers seeking privilege escalation on Windows systems using Sandboxie for sandboxing applications or isolating processes.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Sandboxie for application sandboxing, malware analysis, or secure browsing environments. Exploitation could allow attackers to escape sandbox restrictions, execute arbitrary code with elevated privileges, and potentially move laterally within networks or escalate privileges on critical systems. This could lead to data breaches, system compromise, or disruption of services. Organizations in sectors with high security requirements such as finance, healthcare, government, and critical infrastructure are particularly at risk. The vulnerability's local attack vector means that insider threats or attackers who have gained initial footholds could leverage this flaw to deepen their access. Given the widespread use of Windows in European enterprises and the popularity of Sandboxie as a lightweight sandboxing tool, the vulnerability poses a tangible risk to endpoint security and overall network defense.

Mitigation Recommendations

European organizations should immediately verify their use of Sandboxie and identify any installations running affected versions (>=1.3.0 and <1.15.12). The primary mitigation is to upgrade Sandboxie to version 1.15.12 or later, where the vulnerability is patched. If upgrading is not immediately feasible, organizations should restrict local access to systems running Sandboxie, enforce strict privilege separation, and monitor for suspicious local activity that could indicate exploitation attempts. Additionally, applying application whitelisting and endpoint detection and response (EDR) solutions can help detect anomalous behavior resulting from exploitation. Network segmentation and limiting administrative privileges can reduce the impact of a successful attack. Regular vulnerability scanning and patch management processes should be enhanced to detect and remediate such vulnerabilities promptly. Finally, educating users about the risks of local privilege escalation and enforcing strong access controls will help mitigate exploitation risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-28T20:56:09.083Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f1a9a0acd01a24925abd6

Added to database: 5/22/2025, 12:37:46 PM

Last enriched: 7/7/2025, 10:41:07 AM

Last updated: 8/1/2025, 4:04:30 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats