← Back to CVEs
CVE-2025-64721
CRITICAL10.0
Description
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/11/2025
Last Modified12/22/2025
Sourcenvd
Honeypot Sightings0
Affected Products
sandboxie-plus:sandboxie
Weaknesses (CWE)
CWE-190
References
https://github.com/sandboxie-plus/Sandboxie/commit/000492f8c411d24292f1b977a107994347bc7dfa(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.7(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.