Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64721: CWE-190: Integer Overflow or Wraparound in sandboxie-plus Sandboxie

0
Critical
VulnerabilityCVE-2025-64721cvecve-2025-64721cwe-190
Published: Thu Dec 11 2025 (12/11/2025, 21:15:30 UTC)
Source: CVE Database V5
Vendor/Project: sandboxie-plus
Product: Sandboxie

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:40:58 UTC

Technical Analysis

CVE-2025-64721 is an integer overflow vulnerability classified under CWE-190 affecting Sandboxie, a sandbox-based isolation software for Windows NT systems. The issue exists in versions 1.16.6 and earlier, specifically in the SYSTEM-level service SbieSvc.exe. This service exposes the function SbieIniServer::RC4Crypt to sandboxed processes, which improperly handles a caller-controlled parameter value_len by adding a fixed header size without checking for integer overflow. When a large value_len, such as 0xFFFFFFF0, is supplied, the addition wraps around, resulting in an undersized buffer allocation. Subsequently, when attacker-controlled data is copied into this buffer, a heap overflow occurs. This memory corruption allows an attacker operating within a sandboxed process to execute arbitrary code with SYSTEM privileges, effectively breaking out of the sandbox and fully compromising the host system. The vulnerability requires no authentication or user interaction, making it highly exploitable. The vendor addressed this issue in Sandboxie version 1.16.7. The CVSS 4.0 base score is 9.9, reflecting the vulnerability's critical severity due to its high impact on confidentiality, integrity, and availability, combined with its ease of exploitation and broad scope. No public exploits have been reported yet, but the potential for severe damage is substantial given the privilege escalation vector and the common use of Sandboxie for security isolation.

Potential Impact

For European organizations, the impact of CVE-2025-64721 is significant, particularly for those using Sandboxie to isolate untrusted applications or processes. Successful exploitation allows attackers to escape the sandbox environment and gain SYSTEM-level privileges, leading to full control over affected Windows hosts. This can result in unauthorized access to sensitive data, disruption of critical services, and deployment of persistent malware or ransomware. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often rely on sandboxing for endpoint security, face heightened risk. The vulnerability undermines trust in sandboxing as a security control, potentially increasing the attack surface. Additionally, the lack of required authentication or user interaction means attacks can be automated and propagated rapidly within networks. The critical nature of this vulnerability necessitates urgent remediation to prevent potential large-scale compromises and data breaches within European enterprises.

Mitigation Recommendations

To mitigate CVE-2025-64721, organizations should immediately upgrade Sandboxie installations to version 1.16.7 or later, where the vulnerability is patched. If upgrading is not immediately feasible, consider disabling or restricting access to the SbieSvc.exe service to sandboxed processes to prevent exploitation. Implement strict application whitelisting and endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to sandbox escapes or unexpected SYSTEM-level process creations. Network segmentation can limit lateral movement if a host is compromised. Regularly audit and inventory systems running Sandboxie to ensure no outdated versions remain in use. Additionally, educate security teams about this vulnerability to enhance detection capabilities and incident response readiness. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.922Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b36e922246175c6a34f05

Added to database: 12/11/2025, 9:26:01 PM

Last enriched: 12/11/2025, 9:40:58 PM

Last updated: 12/12/2025, 12:03:56 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats