Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66479: CWE-693: Protection Mechanism Failure in anthropic-experimental sandbox-runtime

0
Low
VulnerabilityCVE-2025-66479cvecve-2025-66479cwe-693
Published: Thu Dec 04 2025 (12/04/2025, 20:57:20 UTC)
Source: CVE Database V5
Vendor/Project: anthropic-experimental
Product: sandbox-runtime

Description

Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.

AI-Powered Analysis

AILast updated: 12/04/2025, 21:24:02 UTC

Technical Analysis

Anthropic Sandbox Runtime is designed to provide lightweight OS-level sandboxing for processes by enforcing filesystem and network restrictions without the overhead of containerization. Prior to version 0.0.16, a vulnerability (CVE-2025-66479) existed due to a bug in the sandboxing logic related to network policy enforcement. Specifically, if the sandbox policy did not specify any allowed domains, the runtime failed to properly enforce network restrictions, effectively allowing sandboxed processes to make network requests outside the intended sandbox boundaries. This represents a protection mechanism failure (CWE-693) where the security control intended to restrict network access was bypassed. Exploitation requires the attacker to have high privileges on the host system (local vector with privileged access) but does not require user interaction. The vulnerability impacts the confidentiality and integrity of the sandbox environment by allowing unintended network communications, potentially leading to data exfiltration or command and control communications from sandboxed code. The vendor released a patch in version 0.0.16 that corrects the enforcement logic to ensure network restrictions are applied even when no allowed domains are configured. No public exploits or active exploitation have been reported to date. The CVSS 4.0 score is 1.8, reflecting low severity due to the requirement for privileged local access and limited impact scope.

Potential Impact

For European organizations, the impact of this vulnerability is relatively low but not negligible. Organizations using anthropic-experimental sandbox-runtime in development, testing, or production environments could face risks if they rely on the sandbox for isolating untrusted or semi-trusted code. The failure to enforce network restrictions could allow malicious or compromised sandboxed processes to communicate externally, potentially leaking sensitive information or facilitating further attacks. However, the requirement for high privilege local access limits the likelihood of remote exploitation, reducing the overall risk. The vulnerability could be more impactful in environments where sandbox-runtime is used to isolate critical workloads or where network isolation is a key security control. European organizations in sectors with high security requirements, such as finance, critical infrastructure, or research institutions, should be particularly attentive. Since no known exploits exist in the wild, the immediate threat is low, but the vulnerability should be addressed proactively to maintain strong security postures.

Mitigation Recommendations

1. Upgrade anthropic-experimental sandbox-runtime to version 0.0.16 or later immediately to apply the patch that fixes the network enforcement bug. 2. Review sandbox policies to ensure that network restrictions are explicitly defined and tested to prevent accidental misconfigurations. 3. Limit privileged local access to systems running sandbox-runtime to trusted administrators only, reducing the risk of exploitation. 4. Implement monitoring and alerting for unusual network activity originating from sandboxed processes to detect potential misuse. 5. Conduct regular security audits and penetration tests focusing on sandbox environments to validate the effectiveness of isolation controls. 6. Consider additional layers of network segmentation and host-based firewall rules to complement sandbox network restrictions. 7. Educate developers and system administrators about the importance of applying security patches promptly and verifying sandbox configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T17:09:52.016Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931f91e0459f550ecfdf6c9

Added to database: 12/4/2025, 9:11:58 PM

Last enriched: 12/4/2025, 9:24:02 PM

Last updated: 12/5/2025, 2:47:30 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats