Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sandboxie-plus
Sandboxie-plus sandboxie |
|
CPEs | cpe:2.3:a:sandboxie-plus:sandboxie:*:*:*:*:plus:*:*:* | |
Vendors & Products |
Sandboxie-plus
Sandboxie-plus sandboxie |
Thu, 22 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 May 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue. | |
Title | Sandboxie Arbitrary Kernel Read in SbieDrv.sys API (API_SET_SECURE_PARAM) | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-22T16:50:18.448Z
Updated: 2025-05-22T17:28:02.958Z
Reserved: 2025-04-28T20:56:09.083Z
Link: CVE-2025-46716

Updated: 2025-05-22T17:27:56.748Z

Status : Analyzed
Published: 2025-05-22T17:15:24.560
Modified: 2025-08-04T17:26:34.820
Link: CVE-2025-46716

No data.