CVE-2025-64721: CWE-190: Integer Overflow or Wraparound in sandboxie-plus Sandboxie
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
AI Analysis
Technical Summary
CVE-2025-64721 is an integer overflow vulnerability classified under CWE-190 affecting Sandboxie, a sandbox-based isolation software for Windows NT systems. The issue exists in versions 1.16.6 and earlier, specifically in the SYSTEM-level service SbieSvc.exe. This service exposes the function SbieIniServer::RC4Crypt to sandboxed processes, which improperly handles a caller-controlled parameter value_len by adding a fixed header size without checking for integer overflow. When a large value_len, such as 0xFFFFFFF0, is supplied, the addition wraps around, resulting in an undersized buffer allocation. Subsequently, when attacker-controlled data is copied into this buffer, a heap overflow occurs. This memory corruption allows an attacker operating within a sandboxed process to execute arbitrary code with SYSTEM privileges, effectively breaking out of the sandbox and fully compromising the host system. The vulnerability requires no authentication or user interaction, making it highly exploitable. The vendor addressed this issue in Sandboxie version 1.16.7. The CVSS 4.0 base score is 9.9, reflecting the vulnerability's critical severity due to its high impact on confidentiality, integrity, and availability, combined with its ease of exploitation and broad scope. No public exploits have been reported yet, but the potential for severe damage is substantial given the privilege escalation vector and the common use of Sandboxie for security isolation.
Potential Impact
For European organizations, the impact of CVE-2025-64721 is significant, particularly for those using Sandboxie to isolate untrusted applications or processes. Successful exploitation allows attackers to escape the sandbox environment and gain SYSTEM-level privileges, leading to full control over affected Windows hosts. This can result in unauthorized access to sensitive data, disruption of critical services, and deployment of persistent malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often rely on sandboxing for endpoint security, face heightened risk. The vulnerability undermines trust in sandboxing as a security control, potentially increasing the attack surface. Additionally, the lack of required authentication or user interaction means attacks can be automated and propagated rapidly within networks. The critical nature of this vulnerability necessitates urgent remediation to prevent potential large-scale compromises and data breaches within European enterprises.
Mitigation Recommendations
To mitigate CVE-2025-64721, organizations should immediately upgrade Sandboxie installations to version 1.16.7 or later, where the vulnerability is patched. If upgrading is not immediately feasible, consider disabling or restricting access to the SbieSvc.exe service to sandboxed processes to prevent exploitation. Implement strict application whitelisting and endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to sandbox escapes or unexpected SYSTEM-level process creations. Network segmentation can limit lateral movement if a host is compromised. Regularly audit and inventory systems running Sandboxie to ensure no outdated versions remain in use. Additionally, educate security teams about this vulnerability to enhance detection capabilities and incident response readiness. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-64721: CWE-190: Integer Overflow or Wraparound in sandboxie-plus Sandboxie
Description
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-64721 is an integer overflow vulnerability classified under CWE-190 affecting Sandboxie, a sandbox-based isolation software for Windows NT systems. The issue exists in versions 1.16.6 and earlier, specifically in the SYSTEM-level service SbieSvc.exe. This service exposes the function SbieIniServer::RC4Crypt to sandboxed processes, which improperly handles a caller-controlled parameter value_len by adding a fixed header size without checking for integer overflow. When a large value_len, such as 0xFFFFFFF0, is supplied, the addition wraps around, resulting in an undersized buffer allocation. Subsequently, when attacker-controlled data is copied into this buffer, a heap overflow occurs. This memory corruption allows an attacker operating within a sandboxed process to execute arbitrary code with SYSTEM privileges, effectively breaking out of the sandbox and fully compromising the host system. The vulnerability requires no authentication or user interaction, making it highly exploitable. The vendor addressed this issue in Sandboxie version 1.16.7. The CVSS 4.0 base score is 9.9, reflecting the vulnerability's critical severity due to its high impact on confidentiality, integrity, and availability, combined with its ease of exploitation and broad scope. No public exploits have been reported yet, but the potential for severe damage is substantial given the privilege escalation vector and the common use of Sandboxie for security isolation.
Potential Impact
For European organizations, the impact of CVE-2025-64721 is significant, particularly for those using Sandboxie to isolate untrusted applications or processes. Successful exploitation allows attackers to escape the sandbox environment and gain SYSTEM-level privileges, leading to full control over affected Windows hosts. This can result in unauthorized access to sensitive data, disruption of critical services, and deployment of persistent malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often rely on sandboxing for endpoint security, face heightened risk. The vulnerability undermines trust in sandboxing as a security control, potentially increasing the attack surface. Additionally, the lack of required authentication or user interaction means attacks can be automated and propagated rapidly within networks. The critical nature of this vulnerability necessitates urgent remediation to prevent potential large-scale compromises and data breaches within European enterprises.
Mitigation Recommendations
To mitigate CVE-2025-64721, organizations should immediately upgrade Sandboxie installations to version 1.16.7 or later, where the vulnerability is patched. If upgrading is not immediately feasible, consider disabling or restricting access to the SbieSvc.exe service to sandboxed processes to prevent exploitation. Implement strict application whitelisting and endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to sandbox escapes or unexpected SYSTEM-level process creations. Network segmentation can limit lateral movement if a host is compromised. Regularly audit and inventory systems running Sandboxie to ensure no outdated versions remain in use. Additionally, educate security teams about this vulnerability to enhance detection capabilities and incident response readiness. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.922Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693b36e922246175c6a34f05
Added to database: 12/11/2025, 9:26:01 PM
Last enriched: 12/11/2025, 9:40:58 PM
Last updated: 12/12/2025, 12:03:56 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67779: (CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-parcel
HighCVE-2025-67780: CWE-306 Missing Authentication for Critical Function in SpaceX Starlink Dish
MediumCVE-2025-66452: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in danny-avila LibreChat
MediumCVE-2025-66451: CWE-20: Improper Input Validation in danny-avila LibreChat
MediumCVE-2025-66588: CWE-824 Access of Uninitialized Pointer in AzeoTech DAQFactory
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.